Secured communication protocol for internetworking ZigBee cluster networks

Published on Aug 1, 2009in Computer Communications3.167
路 DOI :10.1016/J.COMCOM.2009.05.014
Hyun-Jue Kim2
Estimated H-index: 2
(Yonsei University),
Jong-Moon Chung17
Estimated H-index: 17
(Yonsei University),
Chang Hyun Kim4
Estimated H-index: 4
(Yonsei University)
Sources
Abstract
ZigBee uses the network security and application profile layers of the IEEE 802.15.4 and ZigBee Alliance standards for reliable, low-powered, wireless data communications. However, the ZigBee has problems of being less secure, and has a difficulty in distributing shared symmetric keys between each pair of nodes. In addition, the ZigBee protocol is inadequate for large sensor networks, which may consist of several very large scale clusters. In this paper, we first construct a secure ZigBee scheme for realistic scenarios consisting of a large network with several clusters containing coordinators and numerous devices. We present a new key management protocol for ZigBee networks, which can be used among participants of different clusters and analyze its performance.
馃摉 Papers frequently viewed together
2014IRI: Information Reuse and Integration
2014
3 Authors (Agrata Kumar, ..., Kusum Grewal)
2013AMT: Active Media Technology
4 Authors (Jian-Ming Liao, ..., Si-Yu Zhan)
References15
Newest
#1Leonardo B. Oliveira (State University of Campinas)H-Index: 21
#2Diego F. Aranha (State University of Campinas)H-Index: 20
Last. Ricardo Dahab (State University of Campinas)H-Index: 20
view all 6 authors...
After a few years of intense research, wireless sensor networks (WSNs) still demand new secure and cryptographic schemes. On the other hand, the advent of cryptography from pairings has enabled a wide range of novel cryptosystems. In this work we present TinyTate, the first known implementation of pairings for sensor nodes based on the 8-bit/7.3828-MHz ATmega128L microcontroller (e.g., MICA2 and MICAz motes). We then conclude that cryptography from pairings is indeed viable in resource-constrain...
Source
#1Paulo S. L. M. Barreto (USP: University of S茫o Paulo)H-Index: 30
#2Steven D. Galbraith (RHUL: Royal Holloway, University of London)H-Index: 34
Last. Michael Scott (DCU: Dublin City University)H-Index: 58
view all 4 authors...
We present a general technique for the efficient computation of pairings on Jacobians of supersingular curves. This formulation, which we call the eta pairing, generalizes results of Duursma and Lee for computing the Tate pairing on supersingular elliptic curves in characteristic 3. We then show how our general technique leads to a new algorithm which is about twice as fast as the Duursma---Lee method. These ideas are applied to elliptic and hyperelliptic curves in characteristic 2 with very eff...
Source
#1Hyunjue Kim (SKKU: Sungkyunkwan University)H-Index: 2
#2Junghyun Nam (SKKU: Sungkyunkwan University)H-Index: 19
Last. Dongho Won (SKKU: Sungkyunkwan University)H-Index: 31
view all 4 authors...
While broadcasting services have witnessed substantial technological developments which are represented by group-oriented applications, an important on-going challenge is to design secure and efficient group key management. A number of protocols targeted for Pay-TV systems have been developed and proposed. However, most of the forward-secure protocols published up to now are not suitable for practical application in mobile devices. In this paper, we propose a secure and efficient two-round proto...
Source
ID-based cryptosystem has been, for a few years, the most active area of research and currently is of great interest to the cryptographic society. In this work we survey three fundamental ID-based cryptographic primitives Digital Signature, Encryption and Key Agreement, which are based on the mathematical concepts Integer Factorization, Quadratic Residues and Bilinear Pairings. We review several schemes along with their efficiency and security considerations. The survey helps in understanding th...
#1Nils Gura (Sun Microsystems Laboratories)H-Index: 5
#2Arun Patel (Sun Microsystems Laboratories)H-Index: 2
Last. Sheueling Chang Shantz (Sun Microsystems Laboratories)H-Index: 15
view all 5 authors...
Strong public-key cryptography is often considered to be too computationally expensive for small devices if not accelerated by cryptographic hardware. We revisited this statement and implemented elliptic curve point multiplication for 160-bit, 192-bit, and 224-bit NIST/SECG curves over GF(p) and RSA-1024 and RSA-2048 on two 8-bit microcontrollers. To accelerate multiple-precision multiplication, we propose a new algorithm to reduce the number of memory accesses.
Source
#1Chien-Chung Shen (UD: University of Delaware)H-Index: 32
#2C. Srisathapornphat (UD: University of Delaware)H-Index: 11
Last. Errol L. Lloyd (UD: University of Delaware)H-Index: 23
view all 6 authors...
The topology of an ad hoc network has a significant impact on its performance in that a dense topology may induce high interference and low capacity, while a sparse topology is vulnerable to link failure and network partitioning. Topology control aims to maintain a topology that optimizes network performance while minimizing energy consumption. Existing topology control algorithms utilize either a purely centralized or a purely distributed approach. A centralized approach, although able to achie...
Source
#1Dan Boneh (Stanford University)H-Index: 127
#2Ben Lynn (Stanford University)H-Index: 15
Last. Hovav Shacham (Stanford University)H-Index: 40
view all 3 authors...
We introduce a short signature scheme based on the Computational Diffie-Hellman assumption on certain elliptic and hyperelliptic curves. The signature length is half the size of a DSA signature for a similar level of security. Our short signature scheme is designed for systems where signatures are typed in by a human or signatures are sent over a low-bandwidth channel.
Source
Aug 19, 2001 in CRYPTO (International Cryptology Conference)
#1Dan Boneh (Stanford University)H-Index: 127
#2Matthew K. Franklin (UC: University of California)H-Index: 40
We propose a fully functional identity-based encryption scheme (IBE). The scheme has chosen ciphertext security in the random oracle model assuming an elliptic curve variant of the computational Diffie-Hellman problem. Our system is based on the Weil pairing. We give precise definitions for secure identity based encryption schemes and give several applications for such systems.
Source
#1Giuseppe Ateniese (IBM)H-Index: 48
#2Michael Steiner (Saarland University)H-Index: 30
Last. Gene Tsudik (SC: University of Southern California)H-Index: 95
view all 3 authors...
Many modern computing environments involve dynamic peer groups. Distributed simulation, multiuser games, conferencing applications, and replicated servers are just a few examples. Given the openness of today's networks, communication among peers (group members) must be secure and, at the same time, efficient. This paper studies the problem of authenticated key agreement in dynamic peer groups with the emphasis on efficient and provably secure key authentication, key confirmation, and integrity. ...
Source
We discuss analogs based on elliptic curves over finite fields of public key cryptosystems which use the multiplicative group of a finite field. These elliptic curve cryptosystems may be more secure, because the analog of the discrete logarithm problem on elliptic curves is likely to be harder than the classical discrete logarithm problem, especially over GF(2'). We discuss the question of primitive points on an elliptic curve modulo p, and give a theorem on nonsmoothness of the order of the cyc...
Source
Cited By16
Newest
view all 6 authors...
Source
#1Dimitris KoutrasH-Index: 1
#2George Stergiopoulos (UniPi: University of Piraeus)H-Index: 9
Last. Christos DouligerisH-Index: 34
view all 6 authors...
The Internet of Medical Things (IoMT) couples IoT technologies with healthcare services in order to support real-time, remote patient monitoring and treatment. However, the interconnectivity of critical medical devices with other systems in various network layers creates new opportunities for remote adversaries. Since most of the communication protocols have not been specifically designed for the needs of connected medical devices, there is a need to classify the available IoT communication tech...
Source
#1Salam Khanji (ZU: Zayed University)H-Index: 6
#2Farkhund Iqbal (ZU: Zayed University)H-Index: 19
Last. Patrick C. K. Hung (UOIT: University of Ontario Institute of Technology)H-Index: 28
view all 3 authors...
Secure communication is a necessity that must be considered in any smart application to guarantee the confidentiality of information. Recently, ZigBee has been utilized in different smart applications such as automatic metering, power fraud detection, industrial automation and many more. In this research paper, we evaluate the performance of ZigBee from a security perspective. We explore the ZigBee built-in security services, encryption techniques, security keys, and the trust center. The resear...
Source
Oct 1, 2018 in ICEE (International Conference on Electrical Engineering)
#1Benni PurnamaH-Index: 3
#2SharipuddinH-Index: 1
Last. Darmawijoyo HanapiH-Index: 1
view all 6 authors...
Internet of Things (IoT) networks operators may not be fully aware whether each IoT device in their network is functioning safe enough from cyber-attacks. This paper develops an IoT traffic dataset with the purpose of of network traffic analytics to characterize IoT devices, including their typical behaviour mode. We set up an IoT environment/testbed consists of several sensors/nodes and uses Zigbee communication protocol to collect and synthesize traffic traces. Normal dataset and anomaly/attac...
Source
In this paper, delay-constrained data transmission is considered over error-prone networks. Network coding is deployed for efficient information exchange, and an approximate decoding approach is deployed to overcome potential all-or-nothing problems. Our focus is on determining the cluster size and its impact on approximate decoding performance. Decoding performance is quantified, and we show that performance is determined only by the number of packets. Moreover, the fundamental tradeoff between...
Source
#1Jingjie Qin (Tianjin University of Technology)
#2Zhiwei Gao (Tianjin University of Technology)
Last. Zhongming Sun (Tianjin University of Technology)
view all 4 authors...
This paper introduces a flammable gas detection system based on wireless sensor network which adopts chip design of JN5139 and ZigBee. In this system, gas monitoring nodes can self-organize into wireless sensor network, monitor the gas leak status timely and upload to the monitoring center. Flammable gas concentration of each node can be displayed in real time. Once gas concentration is higher than threshold value, the audible and visual alarm will be started. And the information will be shown o...
Source
#1Fan Jianying (Harbin University of Science and Technology)H-Index: 1
#2Wang Xiao-dong (Harbin University of Science and Technology)H-Index: 1
Last. Fu Yao (Harbin University of Science and Technology)H-Index: 2
view all 4 authors...
In order to realize the energy balance of ZigBee, prolonging the survival time of the network, avoiding the paralysis of the network, this paper improves the tree algorithm. This paper firstly introduces ZigBee and the results of some routing algorithms, and then analyzing and comparing the original tree algorithm and AODVjr algorithm, finding out the inadequacies. The original tree algorithm is improved by routing table, eliminating invalid neighbor nodes and balancing energy. Experiment result...
Source
#1Mohammad Ali Moridi (Colorado School of Mines)H-Index: 5
#2Youhei Kawamura (Colorado School of Mines)H-Index: 12
Last. Hirokazu Okawa (Akita University)H-Index: 11
view all 7 authors...
Abstract An automated underground mine monitoring and communication system based on the integration of new technologies is introduced to promote safety and health, operational management and cost-effectiveness. The proposed system integration considering Wireless Sensor Network (WSN) assisted Geographic Information System (GIS) enables to monitor and control underground mining applications from surface office. Based on the capabilities of WSNs, ZigBee network is adapted for near real-time monito...
Source
#1Raed Abdulla (Asia Pacific University of Technology & Innovation)H-Index: 4
#2Widad Ismail (Universiti Sains Malaysia)H-Index: 11
Source
Aug 1, 2014 in IRI (Information Reuse and Integration)
#1Mohammad Rezaeirad (GMU: George Mason University)H-Index: 3
#2Sahar Mazloom (GMU: George Mason University)H-Index: 4
Last. Magdy Bayoumi (University of Louisiana at Lafayette)H-Index: 35
view all 5 authors...
The ZigBee specification is an emerging wireless technology designed to address the specific needs of low-cost, low-power wireless sensor networks and is built upon the physical and medium access control layers defined in IEEE 802.15.4 standard for wireless personal area networks (WPANs). A key component for the wide-spread success and applicability of ZigBee-based networking solutions will be its ability to provide enhanced security mechanisms that can scale to hundreds of nodes. Currently, how...
Source
This website uses cookies.
We use cookies to improve your online experience. By continuing to use our website we assume you agree to the placement of these cookies.
To learn more, you can find in our Privacy Policy.