New Security Approach for ZigBee Weaknesses

Published on Jan 1, 2014in Procedia Computer Science
· DOI :10.1016/J.PROCS.2014.08.056
Wissam Razouk1
Estimated H-index: 1
(SIU: Southern Illinois University Carbondale),
Garth V. Crosby9
Estimated H-index: 9
(SIU: Southern Illinois University Carbondale),
Abderrahim Sekkaki10
Estimated H-index: 10
Abstract The latest version of ZigBee offers improvements over many aspects like low power consumption, flexibility and inexpensive deployment. However problems persist, as the enhanced protocol still has many security weaknesses due to the fact that constrained wireless sensor network devises cannot uses standard security protocols such as public key cryptography mechanisms. In this paper, we highlight relevant security concerns related to ZigBee security features, then we propose a new approach suitable for ZigBee enabled wireless sensor networks. The proposed solution decreases considerably the likelihood of successful attacks,and reduces security impact in the event of a node compromise. Lastly we discuss the security and performance related to the proposed scheme.
📖 Papers frequently viewed together
1 Author (Reshma Patil)
Feb 1, 2012 in ICOIN (International Conference on Information Networking)
#1Kyung Hwa Choi (Ewha Womans University)H-Index: 14
#2Minjung Yun (Ewha Womans University)H-Index: 1
Last. Mihui Kim (Hankyong National University)H-Index: 9
view all 4 authors...
In this paper, we propose an enhanced key management mechanism using ECDH(Elliptic Curve Diffie-Hellman) and subMAC for wireless sensor networks using ZigBee. ZigBee consumes low power and provides security in wireless sensor networks. ZigBee Pro enhances security and supports a large number of applications. Despite enhanced security, ZigBee Pro has vulnerabilities of key management, i.e., weakness of key distribution. We use ECDH for secure key distribution and subMAC to overcome the weakness o...
#1Ender Yuksel (DTU: Technical University of Denmark)H-Index: 8
#2Hanne Riis Nielson (DTU: Technical University of Denmark)H-Index: 33
Last. Flemming Nielson (DTU: Technical University of Denmark)H-Index: 41
view all 3 authors...
#1Yang Xiao (UA: University of Alabama)H-Index: 76
Last. Michael Galloway (UA: University of Alabama)H-Index: 4
view all 6 authors...
Wireless sensor networks have many applications, vary in size, and are deployed in a wide variety of areas. They are often deployed in potentially adverse or even hostile environment so that there are concerns on security issues in these networks. Sensor nodes used to form these networks are resource-constrained, which make security applications a challenging problem. Efficient key distribution and management mechanisms are needed besides lightweight ciphers. Many key establishment techniques ha...
#1Naveen Sastry (University of California, Berkeley)H-Index: 15
#2David Wagner (University of California, Berkeley)H-Index: 95
The IEEE 802.15.4 specification outlines a new class of wireless radios and protocols targeted at low power devices, personal area networks, and sensor nodes. The specification includes a number of security provisions and options. In this paper, we highlight places where application designers and radio designers should exercise care when implementing and using 802.15.4 devices. Specifically, some of the 802.15.4 optional features actually reduce security, so we urge implementors to ignore those ...
#1Elaine B. BarkerH-Index: 27
#2Quynh H. DangH-Index: 3
Cited By10
#1Mahesh Kumar Jha (CMR Institute of Technology)H-Index: 5
#2Monika Singh (CMR Institute of Technology)
Last. Anindita Sahoo (CMR Institute of Technology)H-Index: 3
view all 3 authors...
#1Somaya HaibaH-Index: 1
#2Tomadar MazriH-Index: 1
In this paper, we will discuss the requirements of security that should be included in any system of e-health care based on the internet of things. Then we study the possibility of secure communication between medical tools inside a hospital, using a secure structure for its interfaces, taking advantage of the security mechanisms offered by the communication technology, networks, and protocols exist, according to the construction, and energetic properties of medical objects connected. This paper...
#1Chao-Tung Yang (THU: Tunghai University)H-Index: 23
#2Shuo-Tsung Chen (National Yunlin University of Science and Technology)H-Index: 13
Last. Endah Kristiani (THU: Tunghai University)H-Index: 6
view all 5 authors...
Abstract Indoor environmental monitoring and management system has played an essential role in public health sustainability. By monitoring the indoor air quality in public areas such as schools, offices, home or other buildings, the authorities will be given a better picture of the indoor air quality to take the right steps to ensure the better air quality for people inside the buildings. This system also can give information about indoor air quality information for the society. Therefore, to ac...
Oct 1, 2018 in ICEE (International Conference on Electrical Engineering)
#1Benni PurnamaH-Index: 3
#2SharipuddinH-Index: 1
Last. Darmawijoyo HanapiH-Index: 1
view all 6 authors...
Internet of Things (IoT) networks operators may not be fully aware whether each IoT device in their network is functioning safe enough from cyber-attacks. This paper develops an IoT traffic dataset with the purpose of of network traffic analytics to characterize IoT devices, including their typical behaviour mode. We set up an IoT environment/testbed consists of several sensors/nodes and uses Zigbee communication protocol to collect and synthesize traffic traces. Normal dataset and anomaly/attac...
Nov 1, 2017 in TENCON (IEEE Region 10 Conference)
#1Amiruddin (UI: University of Indonesia)H-Index: 1
#2Anak Agung Putri Ratna (UI: University of Indonesia)H-Index: 7
Last. Riri Fitri Sari (UI: University of Indonesia)H-Index: 15
view all 3 authors...
Security is a key element to support data transmission in a Wireless Sensor Network (WSN). ZigBee is one of the leading communication protocols in the WSN that is now the industry's concern for monitoring and control applications. The security method used in the ZigBee protocol requires a large memory capacity and computing time. This limits the security protocol to meet the real-time requirement for some medical and industrial applications, especially for resource-constrained devices. In this p...
#1Wissam Razouk (Kyushu University)H-Index: 1
#2Daniele Sgandurra (RHUL: Royal Holloway, University of London)H-Index: 18
Last. Kouichi Sakurai (Kyushu University)H-Index: 29
view all 3 authors...
The increase of sensitive data in the current Internet of Things (IoT) raises demands of computation, communication and storage capabilities. Indeed, thanks to RFID tags and wireless sensor networks, anything can be part of IoT. As a result, a large amount of data is generated, which is hard for many IoT devices to handle, as many IoT devices are resource-constrained and cannot use the existing standard security protocols. Cloud computing might seem like a convenient solution, since it offers on...
#1M A ElAffendi (Prince Sultan University)H-Index: 1
#2A Lateef Alamudy (Prince Sultan University)H-Index: 1
The integration of resource constrained devices as front nodes in IoT networks is one of the major factors preventing the adoption proven security best practices and techniques. For example, certificate based authentication is still a forlorn quest for ZigBee designers and developers. Although, the capabilities of these devices may improve over time, there is no indication this will happen soon. This paper proposes a hierarchical device virtualization solution for the problem. The proposed solut...
Objective: In order to achieve real-time to process and collect soil moisture, temperature and light data. Methods: To propose an Mobile energy monitoring system based on ZigBee communication. The system consists of a number of functional modules, each functional module the collected data sink base station, the base station sends data to each server, then the user management service through the remote access server. ZigBee sensor network system based in part on network design, communication modu...
This website uses cookies.
We use cookies to improve your online experience. By continuing to use our website we assume you agree to the placement of these cookies.
To learn more, you can find in our Privacy Policy.