Abstract
Keywords
Introduction
A wireless sensor network (WSN) is a network class where small, battery-powered sensor-equipped nodes (called
Depending on the context in which a WSN is deployed, the need for security in motes communications may arise. As any other network, confidentiality, integrity, and authentication can be enforced by means of cryptography, error detection/correction, and message authentication techniques. However, due to the hard constraints on computing power, memory, and available energy in WSN motes, standard state-of-the-art mechanisms and implementations of security-related algorithms are not always possible. In particular, considering confidentiality and authentications, the accepted techniques require the usage of public-key (i.e. asymmetric) cryptography, which implementations require an amount of memory (e.g. keys, temporary data, and look-up tables) and computing power (e.g. modular arithmetic, random number generation, factorization, exponentiation, and operations on points) which can represent an issue when combined with the actual applications on the motes. On the other hand, techniques involving symmetric cryptography, which are inexpensive and fast, require a key management mechanism to provide each mote the right key to use.
In order to overcome the described issues, a modern and effective approach is represented by the hybrid cryptography. Such techniques mix the public-key and symmetric cryptography in order to overcome the limitations of both approaches.
Background and motivations
Providing security primitives in traditional networks often implies the use of asymmetric cryptography mechanisms. This strategy guarantees an high degree of security, which is sustainable thanks to the ever increasing amount of available resources in terms of computation, memory, and energy. In fact, the robustness of asymmetric cryptography algorithms is highly dependent on the size of the keys that in turn affects the algorithms complexity and the performance of their implementations. In this sense, the elliptic curve cryptography (ECC) 4 is able to provide a very high degree of security with keys shorter than the ones used in other state-of-art public-key algorithms (e.g. Rivest-Shamir-Adleman (RSA), 5 ElGamal, 6 etc.). On the other hand, while symmetric cryptography schemes can grant equivalent security and better performances, they require a mechanism for securely exchanging, updating and revoking the cryptographic keys among the parties. However, when the computation resources, the memory and the available energy become scarce, the complexity associated to asymmetric cryptography make it unfeasible in practice.
Although modified asymmetric cryptography schemes have been discussed,7,8 in this context, the role of symmetric cryptography coupled to a key management technique becomes relevant again. In fact, key management is a fundamental problem in symmetric cryptography, and it has a wide coverage in literature. 9
In the scheme proposed in this article, with respect to the existing key management solutions (see section “Comparison with state-of-the-art solutions”), keys are not fully distributed to each node of the network. Instead, they are the result of a dynamic generation phase based on partial key components (pre-distributed and locally stored in each node) as inputs, as in Pugliese and Santucci’s study. 10 By combining components with low-complexity operations, nodes are able to compute the symmetric decrypt/encrypt key without any prior setup/negotiation.
More in detail, the proposed scheme (topology-authenticated key scheme (TAKS)) represents a quite extension of ephemeral Diffie–Hellman-like cryptographic protocol providing security over a resource-constrained network (typically ad hoc networks, for example, sensor networks for monitoring services) to establish both point-to-point and point-to-multipoint secure links among nodes. Such a scheme, called TAKS2, uses hybrid cryptography, and only partial components of symmetric keys are predistributed (and not the whole keys). It is an evolution of the original TAKS, that was earlier presented by Pugliese and colleagues.10,11 The authentication mechanism of the scheme is based on nodes topology rather than on nodes identity, due to the limited lifetime of nodes in a resource-constrained network. Indeed, while nodes in infrastructure networks can rely on an external power supply and on a stable planned maintenance service with human intervention, the nodes in ad hoc networks can rely only on their own battery or some other energy harvesting mechanism, and maintenance services are usually remotely performed without human intervention. When an off-duty node is replaced with a new node, the new node identity enters in the network, but node topology remains unchanged and the authentication mechanism does not need any updating. Security features of TAKS2 include confidentiality (data encryption), data integrity, and sender authentication (signature). In TAKS2, the shared secret is a symmetric key generated by each party involved in the communication session upon a successful authentication process: each party verifies if the other party belongs to its authenticated network. The assignment parameter to each node is carried out by an external certification authority (CA), next the scheme parameters are pre-loaded into the nodes. Vector space rather than scalars over Galois fields has been introduced to allow the setup of truly scalable multicast communication sessions, hence without setting up multiple unicast sessions: the added dimensionality respect to scalars introduces a further degree of freedom for CA in the procedure of scheme parameters computation and assignment. From an engineering point of view, multicast sessions provide a relevant feature, especially for clustered networks, where time synchronization in data transmission is required as well as lighter memory storage: multicast sessions avoid traffic flooding, hence wasting of energy, when maintenance services are activated on such clustered networks (e.g. the updating of some configuration parameters in a specific portion of the network). With respect to classical solutions of key-assignment schemes on network, the scheme proposed in this article does not rely on pre-distribution of the complete keys but of a component of them: this is a nice property from a robustness point of view because the shared secret in elliptic curve TAKS (ECTAKS) is a function of both sender and receiver private key components, while in ordinary ephemeral Diffie–Hellman-like schemes typically the shared secret is a function of the complete sender whole private key and the receiver whole public key.
Moreover, the article reports the details of the implementation of the proposed scheme both in nesC/TinyOS 2.x, an operating system for a variety of families of sensor nodes, 1 and in bare-metal C language (supported by Atmel legacy libraries). 12 Finally, the article describes the experimental results obtained by means of real deployments on two hardware platforms: a clone of the famous Texas Instruments TelosB sensor node and a legacy sensor node provided by Atmel, both compliant with the IEEE 802.15.4 standard protocol. To resume, the main contributions of this article are:
TAKS2 SW design has been improved to consider also star topologies other than point-to-point ones (section “Introduction to 802.15.4”).
TAKS2 has been implemented on top of the MAC layer of two different IEEE 802.15.4–enabled WSN hardware platforms (section “TAKS2 design considerations”).
A testbed application has been developed to simulate a real-world monitoring scenario (sections “Basic network configuration” and “Scenarios description”).
This testbed has been used to validate the correctness of the scheme and to evaluate its performances in terms of computation time and memory occupation (sections “Performance evaluation” and “Results”).
Comparison with state-of-the-art solutions
Symmetric cryptography schemes, such as Advanced Encryption Standard (AES 13 ), have usually very high performance and limited footprint in memory. Moreover, to improve performance, various micro-controllers and radio transceivers provide symmetric cryptography primitives directly as hardware accelerators. However, in symmetric schemes, the symmetric key needs to be known and available by every node before sending or receiving messages.
This requirement leads to the Key Distribution and Key Management issues frequently addressed in the literature. In fact, there are solutions based on key pre-distribution, 14 which consist of the deterministic pre-distribution of keys. The trivial security solution consists in distributing a key for each pair of nodes, and, as extreme (and less secure) case, the same symmetric key for each node of the network. A derivation of the previous mechanism is the random pair-wise key schemes which consist of storing only a subset of all possible keys in each node. 15 Nodes that wish to communicate have to negotiate a key with their peers, by selecting a random key from their subset. A simplification is possible if nodes locations are known, by providing to each node only the keys for the actual neighbors. 16 In cluster-based networks, it is possible to adopt a cluster pre-distribution scheme. Clusters use different keys, 17 while, within a cluster, the same key is used. Some mechanisms, for example, the master key pre-distribution 9 define a master key which is used (combined with some previously exchanged nonce values) by nodes to re-create the symmetric key. Some schemes 18 use different paradigms to distribute the keys, such as the use of mobile-agents capable of moving inside and distribute the cluster key dynamically and with reduced energy consumption. Alternative schemes use the key-matrix based dynamic key generation, 19 the identity-based encryption 20 and the threshold cryptography 21 to manage and distribute keys while reducing the energy consumption.
In this context, while TAKS2 does not achieve the same performance of a pure symmetric scheme, it resolves the secure key distribution problem with a small impact on performance. On the other side, public-key schemes (e.g. RSA and ECC) solve the key distribution problem and provide a higher degree of security at the cost of increased impact on performance and memory. For example, in a typical WSN node with a 8-bit micro-controller, the modular arithmetic operations, such as addition and multiplication, have to be implemented by means of algorithms which operate byte-wise on the numbers/points, introducing a non-negligible impact on performance and memory. In TAKS2, instead, the complexity and impact of such operations are moved to the key components generation: once the key components are available to nodes, the operation to combine them so obtaining the symmetric key (i.e.
In comparison with other hybrid-cryptography schemes,22−25 TAKS is suitable for real-world WSN motes, has lower average overhead both in timing performance and memory occupation, and provides the possibility of choosing different approaches for symmetric encryption/decryption and for authentication of received messages. In Table 1, we present a brief comparison of common general cryptographic solutions and TAKS2, while in Table 2 a comparison with other state-of-the-art hybrid cryptographic schemes for WSN is shown. TAKS supports all the hardware platforms supported by the TinyOS 1 operating system, whereas in most of the state-of-the-art hybrid cryptography schemes the OS/hardware support is not clear or limited to software simulations. The performance overhead (apart from the networking stack overheads) is comparable or better than the other schemes with a memory occupation which is beaten only by adopting external hardware modules (as in Hu et al. 27 ). TAKS provides its own lightweight key exchange protocol (described by Pomante et al. 11 and reported in this article), symmetric key encryption with no restriction on the key size or the cipher used and an authentication primitive based on the message authentication code (MAC) check. Other schemes, instead, have only a single23,24 or fewer cryptographic capabilities.
Comparison of TAKS2 against other solutions.
WSN: wireless sensor network; AES: Advanced Encryption Standard; TAKS2: topology-authenticated key scheme 2; DSA = digital signature algorithm; ECIES = elliptic curve integrated encryption scheme; ECDSA = elliptic curve digital signature algorithm; CCM = counter with CBC-MAC mode; GCM = Galois counter mode.
TAKS2 comparison with other state-of-art hybrid-cryptography schemes. The table compares different features: the supported operating systems, the overhead (i.e. additional delay) introduced in communications, the amount of additional memory required to support the scheme, the adopted key exchange protocol (if any), the symmetric encryption and decryption protocols (if any) and the authentication protocol (if any).
RAM: random access memory; ROM: read only memory; TX: transmitter; RX: receiver; MAC: message authentication code; AES: Advanced Encryption Standard; TAKS: topology-authenticated key scheme; SCUR = secure communications in wireless sensor networks using rabbit; XTEA = eXtended tiny encryption algorithm; EHKM = efficient hybrid key management; ECC = elliptic curve cryptography; ECDH = elliptic curve diffie-hellman.
The question mark (“?”) denotes that no information about the referenced feature has been found.
Paper organization
The next sections of the article are organized as follows. In section “TAKS,” original TAKS scheme is resumed along with the enhancements of its second version, that is, TAKS2. Section “Security analysis” covers the security analysis of TAKS2. Section “Computational and spatial complexity analysis” describes the theoretical computational and spatial complexity of TAKS2. In section “Design and implementation issues,” design and implementation issues over two different WSN platforms are discussed while, in section “Verification and performance evaluation,” the verification and the performance evaluation processes, with related experimental results, are described in detail. Finally, section “Conclusions and future works” concludes the article with some comments and planned future works.
TAKS
TAKS is a cryptographic scheme to provide passive security at link layer. TAKS is a hybrid deterministic key establishment protocol (KEP) to establish both pair-wise and cluster-wise secure links. Its security functions include confidentiality (data encryption/decryption), data integrity, and sender authentication (signature). The symmetric key is generated by the parties on a successful authentication process (
Each node pre-stores a set of TAKS security parameters (denoted as local configuration data, LCD) namely the local key component (LKC), a set of transmitted key components (TKCs) and and a set of topology vectors (TVs), each TV associated to a node belonging to the ANT. LKC takes the role of private key of the node while TKCs and TVs take the role of public key of the node/cluster of nodes. An (external) CA binds LKC to the node ID and TKCs/TVs to the nodes IDs (or Cluster IDs) associated to the ANT. Therefore, the membership of a node to a specific ANT is certified by the assignment of the associated TV. Any node in a specific ANT is an authenticated node. A TAK is generated if the involved parties belong to the same ANT (hence the attribute of “topology-authenticated key”). The PNT is implemented as a distributed data structure, in which the information on the available communication links are stored for each node in the network. In particular, each node portion of the PNT contains (at minimum) the subset of TKCs and TVs relative to each one available to the node. Additional information could be stored if required by the TAKS implementation. TAKS2 is the enhanced version: 11 both represent a hybrid cryptography scheme, since they do not rely explicitly on asymmetric or symmetric keys to secure the WSN data transmissions. In literature, there exist other hybrid cryptography schemes25,28,29 but TAKS2 is the only scheme proving WSNs with a secure encryption mechanism along a topology-based authentication with minimal performance overhead and memory footprint.
Description of the cryptographic scheme
Before describing the inner mechanisms of the cryptographic scheme, we present the security level definitions that will be adopted in the rest of the article: 11
Public: general public information, accessible by anyone (attackers included).
Restricted: network-level private information (accessible by nodes in the network).
Private: node-level private information.
Secret: planner-level private information.
As a requirement of the scheme, a data structure called LCD has to be stored inside the WSN nodes. The LCD contains the definition of scheme parameters, including the key partial components and topology information. Topology definition can be physical (e.g. with geographical position of nodes) or logical (i.e. in terms of which node pairs can communicate) depending if the scheme is applied on physical/MAC layer or upper layers, respectively. LCD includes:
The local key component (LKC);
The (ephemeral) transmit key component (TKC);
And planned network topology (PNT).
LKC is a component that is kept secret and stored in the target node, while TKC is a public component that is distributed to every node enabled to communicate with the target node. PNT is a set of TVs used to describe the relationship (one-to-one or one-to-many) among eligible neighbor nodes for pair-wise and cluster-wise link configuration, respectively. The security of the proposed scheme is based on the confidentiality of some offline secret parameters (denoted as “
In the following paragraph, we introduce the scheme (details can be found in Pugliese and colleagues’ studies).10,11
Choose a large prime number
Let be a function, called
The
Let
The
In Figure 1, a representation of the proposed scheme is shown.

TAKS2 scheme description.
Given the set of eligible neighbors nodes of node
In every communication, a
The result of the symmetric key encryption of the message, the cipher text (
The key reconstruction information (KRI,
A MAC
As shown in Figure 1,
Upon the reception of a message, the node
The message authenticity function
Starting from the first version, TAKS has evolved into TAKS2.10,11 This second version has the following main features:
TVs in a node can now coincide with the TKCs of its eligible neighbors. This reduces the memory occupation in nodes when pair-wise communications are adopted.
In TAKS2, the transmission protocol uses only a single phase for the setup of the scheme, that is, no prior exchange of the TKCs between nodes is needed. This is possible thanks to the
In TAKS2, authentication is performed by a standard authentication function (e.g. HMAC).
The main drawback in TAKS2 is the ephemeral TKC to be transmitted each time a new
Formal apparatus of TAKS/TAKS2
Building blocks of the proposed scheme are as follows:
Hybrid-key cryptography.
Topology-based network authentication.
Hybrid-key cryptography
Let nodes
(a) Let
(b) Let
(c) Let
(d) Select
(e) Let
(f) Let
(g) Parameters
(h) Let
(i) Let
(j) Let
(k) Let
(l) Let
(m) Let
(n) Let:
Pair-wise TAKS2
In pair-wise communications, the scheme can be simplified using the following additional definitions:
(o) Let
(p) Let be
(q) Let
(r) Expressions for
Theorem 1 (pair-wise TAKS2 generation)
Let
Proof
Applying the definition of
Applying the definition of
Using the vector algebra property
So, in TAKS2:
The transmitter TAK is the scalar product between the LKC and the TV associated to the destination node.
The receiver TAK is the scalar product between the LKC and the TKC.
Furthermore, fixing
The LKC components are different for different nodes since
The TKC components are different for different nodes since
Topology-based authentication
As by Pugliese and Santucci,
10
TAKS/TAKS2 authentication is based on two main elements: a verification function
With the definition of
Given a user-selected keyed hash function,
31
Theorem 2 (network topology authentication)
In a node pair
Proof
Node
Security analysis
Security analysis can be performed along three proofs: entropy highness of the secret share, robustness (or reliability) of data transmissions for a single node (node level) and for a set of connected nodes (network level). The former deals with the goodness and effectiveness of the generated TAK as a cryptographic key for an high-entropy encoding. The latter with the complexity of the reverse problem associated to the cryptosystem to derive the private key materials from publicly known parameters: the lower the complexity, the lower the reliability can be assured by the cryptosystem in data transmission: at a node level this means the evaluation of the computational complexity of the reverse problem. However, in case of a compromised node (e.g. the node has been physically captured by the attacker), next problem would become how reliability in data transmission for other nodes could be reduced in case where one or more nodes were compromised. Therefore, robustness at network level can be straightforwardly defined as the maximum percentage of compromised nodes that cannot reduce reliability in data transmissions for the other nodes in the network.
Let us start with TAK entropy evaluation. TAK entropy relies on the randomness of the secret TAKS primitives
For what concerns TAKS robustness at single node and network levels, the following proofs can be provided.
Scheme robustness at single node level: In TAKS2, the reverse problem derives the secret TAKS primitives
Proof
Each equation in (q) shows that the functional relationship between
Scheme robustness at network level: Given a network with
The maximum value for
Proof
Equations in (q) should be both solved for
Iteratively, if the node
Computational and spatial complexity analysis
In this section, we describe the computational and spatial complexity of proposed scheme regardless of which symmetric encryption/decryption algorithm and MAC function are adopted. Table 3 shows the computational complexity of TAKS2. Also, assuming that:
Data are made of words of 1 or multiple bytes.
The generation of a
The sum of two words costs
The multiplication of two words costs
Then:
To generate a
To add two
To multiply two
An
To compute TAK at the destination node, we need to search for the right TKC/TV (e.g. linear search:
Computational complexity of TAKS2 functions.
In a point-to-point communication scenario, since sending a complete message using TAKS2 consists of executing the functions
The spatial complexity is analyzed as follows. Assuming:
Each key component (LKC, TKC) requires
The
Each node has to store its LKC and the TKCs of each neighbor node inside the PNT.
We can state that:
Each node has to reserve an additional space of
Design and implementation issues
The topic of this section is the design and implementation of TAKS2 for a real-world star topology WSN. First, a basic background on 802.15.4 is provided, followed by specific considerations for TAKS2; then, implementation issues are analyzed for software architecture and details about two different available MAC layers are explained.
Introduction to 802.15.4
The IEEE 802.15.4 32 is the reference standard on low rate wireless personal area networks (abbr. LR-WPAN). It describes the first two layers of the ISO/OSI networking protocol stack (the physical layer and the MAC layer). The IEEE 802.15.4 defines two types of nodes: the full function devices (FFD) and the reduced function devices (RFD). While the RFD are devices capable to perform only basic computation and data retrieval, the FFD are more complex and computational powerful devices, capable also to act as WPAN coordinator of the network. The WPAN coordinator (i.e. coordinator) is the device responsible of creating, maintaining, and synchronizing the network.
The standard defines some basic network topologies (e.g. basic peer-to-peer, star topology, and cluster tree) and two WPAN types. The nodes in a beacon-enabled WPAN have an isochronous channel access obtained through the use of beacon frames emitted by the coordinator. Instead, in a beaconless WPAN, the nodes communicates without such frames. In both cases, the CSMA-CA channel access mechanism is used: in the case of beacon-enabled PANs, the slotted CSMA-CA is used, while the unslotted CSMA-CA (ALOHA) is used in the beaconless PANs.
In the case of beacon-enabled PANs, the standard defines a

The IEEE 802.15.4 superframe structure. 32
Each of the two provided layers offers a set of services via a corresponding set of interfaces. The services offered by the PHY layer to the MAC layer are the PHY data service (PD) and the PHY management service (PLME). The services provided by the MAC layer to the higher layers are the MAC data service (MCPS), and the MAC management service (MLME).
While the IEEE 802.15.4 PHY layer is commonly implemented in radio chips, the MAC layer specification has not a wide selection of available implementations. This is due the fact that applications often use simpler techniques for accessing the communication channel instead of implementing a 802.15.4 compliant MAC layer. Despite this aspect, in literature exist some valid implementations of the 802.15.4 MAC layer. In this article, we consider two well-known implementations: the TKN154 33 and the Atmel Stack MAC layer. 34
TAKS2 design considerations
In order to provide an efficient TAKS2 architecture design, the features of the IEEE 802.15.4 standard have been taken into consideration in the design phase.
First of all, in order to provide a seamless and efficient integration with the IEEE 802.15.4 standard, TAKS2 is designed to operate directly at the MAC layer although it is possible, in general, to implement TAKS also in upper layers. TAKS2 cryptographic primitives are made available to the MAC layer services, for example, during the device association, to achieve a better control over incoming and outgoing transmissions and smaller latency during encryption, decryption, and authentication.
As a consequence, a device inside a TAKS2-enabled WSN has to pass two kinds of association before being able to transmit and receive data from the coordinator. The first is the IEEE 802.15.4 MAC association step (via the MLME-ASSOCIATE interface defined in the standard), while, the second is the TAKS2 association, a primitive that enables a device-coordinator link to be validated through the TAKS2 authentication function defined in the previous sections.
TAKS2 uses a set of finite state machines (FSMs; Figure 3) to control the behavior of cryptographic primitives. In particular, each device node has a tri-state machine with the following states:
Unknown—the device is not currently associated to the coordinator.
Associated—the device is associated (via the IEEE 802.15.4 association mechanism) to the coordinator.
Ready—the associated device is authenticated also via the TAKS2 association. In this state, the device can exchange messages with the coordinator.

FSM used by TAKS2 for the device nodes.
The coordinator keeps and updates a copy of the state of each device FSM, so that is also possible for it to monitor the overall WSN state. TAKS2 uses a set of additional data structures (Figure 4) to support the IEEE 802.15.4 standard:
The Address Pool represents the set of available device addresses. Each entry in the data structure contains the short and extended 802.15.4 address and an availability flag.
The Neighbor Table stores a set of neighbor control blocks (NCB), one for each device. An NCB contains the address information of the device (short and extended address), its FSM state and the private cryptographic information (key reconstruction information, SS and TKC/TVs).

TAKS2 data structures.
SW architecture and implementation issues
In this section, we describe two implementations of TAKS2 based on the design described in the previous section. One adopts the TKN154 MAC layer and the other is based on the Atmel proprietary stack. The main goal is to demonstrate the feasibility of using TAKS2 on top of well-known IEEE 802.15.4-compliant network stacks. In the following sections, the two implementations are discussed and the feasibility of introducing TAKS is analyzed. Then, both of them are verified and compared to highlight the advantages and disadvantages of each one, with particular attention to their performance results.
Software architecture
The software architecture adopted in both implementation is shown in Figure 5. The architecture uses the bridge design pattern in order to provide a non-intrusive, de-coupled, and flexible approach to connect the target MAC layer with the TAKS2 components. In Figure 5, the IEEE 802.15.4 MAC layer (bottom box) offers two of the available services (

TAKS2 implementations common architecture.
TKN154
The TKN154 is an open-source implementation of the 802.15.4 MAC layer from the Telecommunication Network Group of the Technical University of Berlin. The TKN154 is based on TinyOS 2.x operating system, it is written in the nesC language, and it is compatible with node platforms which use the CC2420 radio chip (e.g. TelosB, T-Mote, and MicaZ). The TKN154 offers four major features:
The TKN154 source code is released under an open-source license.
The code is organized to be as independent as possible from the underlying hardware platform. Hardware-dependent code is separated through interfaces from the rest of the code.
Most of the features of the 802.15.4 standard are kept in separated components, making possible to enable or disable them selectively.
The whole TKN154 architecture is organized in various abstraction levels, allowing it to be highly customizable.
One drawback of the TKN154 is the pre-requisites needed by a platform to be fully compatible with it. The most evident of these prerequisites is a proper and stable hardware timer, which should be able to output a 62.5 kHz frequency clock with a maximum error of 40 ppm.
Atmel MAC
The TKN154 project is not the only 802.15.4 MAC implementation available: Atmel provides a proprietary network stack 34 for its AVR platforms which complies on the 802.15.4 standard. The stack is organized into sub-layers. Among those, the platform abstraction layer (PAL), the transceiver abstraction layer (TAL), and the MAC core layer (MCL) constitute the part of the stack that can be seen as the MAC layer. The first provides hardware-dependent code needed to interface to available peripherals, the TAL takes care of frame handling, power management, CSMA handling and general state transitions while, the MCL implements the basic 802.15.4 MAC standard primitives, such as the MAC Management Service (MLME).
Random number generation
The
Verification and performance evaluation
In order to check the correctness of the implementations of the scheme and their performance, in this section, we describe the verification phase of TAKS2. A set of scenarios, each one using a different operating conditions for devices and coordinator, has been selected to test TAKS2 components. For each scenario, we have verified the correctness and the effectiveness of the TAKS2 implementations when deployed in a star topology (the verification of the basic point-to-point configuration can be found in Pomante et al.’s 11 study).
Basic network configuration
The basic network configuration used in the verification phase (Figure 6) consists of a star-topology WSN formed by one cluster head node (coordinator) connected to nine different cluster member nodes (device).

Performance evaluation network topology.
This is a common topology that is used in data collection environments, where the cluster members are meant to retrieve data while the cluster head collects, elaborates, and transmits them.
The sensor nodes used in the experiments are the following:
For the TKN154-based implementation, we have adopted the Advanticsys CM5000 36 (Figure 7), a clone of the more famous TelosB 37 node. This node embeds an MSP430 micro-controller unit, a CC2420 radio chip (IEEE 802.15.4 compliant), a 48 kb of flash memory, and 10 kb of RAM.
For the Atmel MAC implementation, we have adopted the nodes included inside the Atmel REB212BSMA-EK kit 38 (Figure 8). They are based on the Atmel ATMega1281 micro-controller unit with 128 kb of flash, 8 kb of RAM memory, and the AT86RF212B (IEEE 802.15.4 compliant) radio transceiver.

CM5000 WSN Node.

Atmel REB212BSMA: Node.
Testbed application
During the experiments, the coordinator and the devices have been programmed with a testbed application. This testbed performs a typical monitoring application using directly the interfaces provided by the MAC layer. In this way, we can verify the correctness of TAKS2 primitives and the communication between TAKS2 and the MAC layer in a
Each device periodically samples its installed sensors (i.e. temperature and humidity), builds a message with the retrieved measures and sends it to the coordinator.
The coordinator receives messages, parses their content, aggregate the measurements, and sends the result to the PC via the UART port.
This testbed is deployed in two flavors, the un-secure version (i.e. no TAKS2) and the secure version (i.e. using TAKS2). The two versions differ on the components involved in the communication: the un-secure testbed communicates using no additional layers, while the secure version uses TAKS2 via the bridge layer discussed in section “Computational and spatial complexity analysis.” The two versions of the testbed have been deployed and tested on the CM5000 WSN nodes (using the TKN154 MAC) and on the REB212BSMA kit nodes (using the Atmel 802.15.4 MAC). The discussion of the obtained results is reported in the following paragraphs.
Scenarios description
In order to verify the implementations and to evaluate performances, we have used both the un-secure and secure versions of the testbed application against five different scenarios, each one with a different set of network parameter (more information about these parameters can be found in IEEE 802.15.4-2015 32 ) values. The network parameters we have considered are shown in Table 4.
MAC parameters sets.
The selected length (in bits) for the elements in
Verification results
The verification of both TAKS2 implementations with the two testbed versions across the different MAC parameters sets has been successful: by analyzing the outputs of the communications between the coordinator toward the PC, it is possible to reasonably state that TAKS2 works as intended: the

TAKS2: data from a sender node (left) and a receiver node (right) sent to PC via UART.
Performance evaluation
Following the initial verification, a performance evaluation has been conducted in order to analyze the overhead related to the usage of the scheme. So, in this section, we first introduce the metrics that have been defined to evaluate the performance, then we report some of the obtained results, mainly focusing on the scheme impact on performances.
Metrics
In order to evaluate the performance of TAKS2 scheme implementations and the impact on the MAC layer performance, we have defined two set of metrics. The first set is composed of metrics related to the overall MAC layer performance:
MAC layer association (MAC Assoc). This is the time needed by a device node to successfully perform the IEEE 802.15.4 association process (
Transmission time (TX time). This is the delay between the MAC data request (
Reception time (RX Time). This is the delay between the MAC layer data arrival (
Frame Error Rate. This is the number of unsuccessfully received frames by the MAC layer with respect to the total transmitted frames.
The second set of metrics has been used to evaluate the performances of TAKS primitives (e.g. encryption, decryption, key generation, etc.):
TAKS2 key computation time (TX key gen): This is the time required by TAKS2 to successfully generate a Shared Secret from the key components.
TAKS2 key retrieval time (RX key gen): This is the time required by TAKS2 to successfully recreate the proper Shared Secret from the
TAKS2 Association Delay (TAKS2 Assoc): This is the delay introduced by the TAKS2 Association, which takes place after the IEEE 802.15.4 default MAC association process (
Results
In order to correctly evaluate the MAC layer and TAKS2 performance, we have conducted tests considering all the parameters set reported in Table 4. The tests have been replicated for the un-secure and TAKS2-enabled versions of the testbed for both the MAC layer implementations. The results reported in this section are the average values of the metrics described in section “Verification and performance evaluation” performed across the different parameter sets and each device node. The results for the TKN154-based implementation are shown in Table 5 for un-secure testbed application and in Table 6 for the secure version, while, in Tables 7 and 8, we show the results related to the Atmel Stack. The total memory overhead of the secure version for storing the LCD in our test scenario (Figure 6) has been ∼400 bytes for the cluster-head node and ∼200 bytes for the other nodes. The size of additional code required to implement the
Un-secure stack (TKN154).
MAC: message authentication code; TAKS: topology-authenticated key scheme.
Secure stack (TKN154).
MAC: message authentication code; TAKS: topology-authenticated key scheme.
Un-secure stack (Atmel).
MAC: message authentication code; TAKS: topology-authenticated key scheme.
Secure stack (Atmel).
MAC: message authentication code; TAKS: topology-authenticated key scheme.
Result analysis
The results show that in the TKN154 secure version of the testbed, the performance loss introduced in Tx/Rx operations is around
Considering a typical monitoring application deployed on a WSN, for example, a star-topology with the local PAN coordinator acting also as sink-node a the center, the performance overhead could be neglected if the transmission frequency is less than the maximum time required to sample, encrypt, associate, and transmit the measurements. As the results show, baseline TAKS2 implementation on common WSN nodes is effective in the case of slow-monitoring application. In order to make TAKS2 effective also for higher transmission frequency, the following solutions could be adopted while preserving the security level:
Encrypting and sending multiple samples per transmission.
Providing a platform-specific implementation of TAKS2 to gain advantages from the platform-specific features (e.g. hardware multiplicators).
On the memory impact, both implementations use less than 2 kb of additional memory to store data and code required by the scheme. Considering state-of-the-art cryptographic schemes and their implementation on WSN platforms (e.g. AES, RSA, ECC-ECIES), we can state that, generally, TAKS requires more memory than pure symmetric schemes (since TAKS itself requires a symmetric encryption scheme), but less than any public-key schemes. In fact, considering public-key schemes such as the ECC-based encryption scheme ECIES 39 and using the least possible memory, each node is still required to store, in addition to its private and public keys, at minimum, the curve domain parameters for each supported curve and the code required to implements elliptic curve basic point operations (in the order of tens of kilobytes).
Conclusions and future works
This article has presented the evolution of a hybrid cryptography scheme, based on the generation of topology-authenticated keys, specifically designed for WSN platforms. The scheme has been demonstrated formally by proving that the scheme is
The work described in this article is part of a wider research project that aims to create a secure framework for WSN to provide a encryption/decryption scheme associated with an
