Browse > Article

Implementation of the ZigBee-based Homenetwork security system using neighbor detection and ACL  

Park, Hyun-Moon (Korean Electronics Technology Institute)
Park, Soo-Hyun (Department of Business Information Technology, Kookmin University)
Seo, Hae-Moon (Korean Electronics Technology Institute)
Publication Information
Abstract
In an open environment such as Home Network, ZigBee Cluster comprising a plurality of Ato-cells is required to provide intense security over the movement of collected, measured data. Against this setting, various security issues are currently under discussion concerning master key control policies, Access Control List (ACL), and device sources, which all involve authentication between ZigBee devices. A variety of authentication methods including Hash Chain Method, token-key method, and public key infrastructure, have been previously studied, and some of them have been reflected in standard methods. In this context, this paper aims to explore whether a new method for searching for neighboring devices in order to detect device replications and Sybil attacks can be applied and extended to the field of security. The neighbor detection applied method is a method of authentication in which ACL information of new devices and that of neighbor devices are included and compared, using information on peripheral devices. Accordingly, this new method is designed to implement detection of malicious device attacks such as Sybil attacks and device replications as well as prevention of hacking. In addition, in reference to ITU-T SG17 and ZigBee Pro, the home network equipment, configured to classify the labels and rules into four categories including user's access rights, time, date, and day, is implemented. In closing, the results demonstrates that the proposed method performs significantly well compared to other existing methods in detecting malicious devices in terms of success rate and time taken.
Keywords
ZigBee Security; ACL; Ato-cell; Homenetwork testbed; Malicious Tempering;
Citations & Related Records
Times Cited By KSCI : 2  (Citation Analysis)
연도 인용수 순위
1 Femtocell Forum, http://www.femtoform.org
2 Picochip Inc, 'The Case for Home Base stations,' September 2008
3 ITU-T Study Group 17, http://itu.int/ ITU-T/ studygroups/com17
4 이윤경, 한종욱, 정교일, '홈네트워크 보안 표준화 동향,' 전자통신동향분석, 제22권, 제1호, 73-81쪽, 2007년 2월   과학기술학회마을
5 서대열, 김진철, 김경목, 오경환,' ZigBee 네트워크에서 효율적인 Parent-Child 키 연결 알고리즘,' 한국전자공학회, 제 43권, 제 10호, 35-46쪽, 2006년 10월
6 Moazzam Khan , Fereshteh Amini and Jelena Misic, 'Key Exchange in 802.15.4 Networks and Its Performance Implications.' Mobile Ad-hoc and Sensor Networks, Vol. 4325, pp497-508, 2006   DOI
7 Wander, A., Gura, N., Eberle, H., Gupta, V., Shantz, S. C (2005) ''Energy Analysis of Public-Key Cryptography for Wireless Sensor Networks'', Proceedings of the Third IEEEInternational Conference on Pervasive Computing andCommunications PerCom2005, pp 324-328. Mach 2005.
8 김도우, 한종욱, 정교일, '홈디바이스 인증/인가 기술동향,' 정보통신연구진흥원, 주간기술동향, 제 1326호, 1-11쪽, 2008년 1월
9 ZigBee Alliance, 'ZigBee 2007 specification Document R17,' October 2007
10 Ember Inc.,' EmberZNet 3.1 New Features and Changes,' April 2008
11 Ken Masica, 'Securing ZigBee Wireless Networks in Process Control System Environments,' CSSP, pp1-22, 2007
12 이덕규, 김도우, 한종욱, '홈네트워크 보안 기술 및 표준화 동향,' 전자통신동향분석, 제23권, 제 4호, 89-101쪽, 2008년 8월   과학기술학회마을
13 ZigBee Alliance, 'Home Automation Profile Specification R25, ZIGBEE HOME AUTOMATION PUBLIC APPLICATION PROFILE,' October, 2007
14 David Boyle and Thomas Newe, 'Securing Wireless Sensor Networks: Security Architectures,' JOURNAL OF NETWORKS, Vol. 3, No. 1, January 2008
15 김태근, 박재형, '홈네트워크 기반의 차세대 통방 융합 서비스 : UTV(Ubiquitous TV),' 한국통신학회. 제 23권 ,제8호, 65-73쪽, 2006년 8월   과학기술학회마을
16 김양섭, 'Zigbee 네트워크를 위한 코디네이터 중심의 침입탐지시스템,' 중앙대학교, 2007년
17 Gunhee Lee, Jaesung Lim, Dong-kyoo Kim, SungHyun Yang and MyungHyun Yoon, 'An Approach to Mitigating Sybil Attack in Wireless Networks using ZigBee,' ICACT2008. 10th International Conference on, pp.1005-1009, Gangwon-Do ,KOR, 2008
18 김진철, 오영환, '공개키 방식의 LR-WPAN보안 알고리즘,' 한국전자공학회, 제 43권, 제 11호, 54-67쪽, 2006년 11월
19 ITU-T Study Group, 'Framework of security technologies for home network,' February 2007
20 Texas Instruments Incorporated (2007) Z-Stack ZigBee Protocol Stack [online], available: http://focus.ti.com/docs/toolsw/folders/print/ z-stack.html
21 J. Douceur, 'The Sybil Attack', in Proc. of the First International Workshop on Peer-to-Peer Systems.(IPTPS'02), Cambridge, MA, March 2002   DOI
22 Naveen Sastry and David Wagner, 'Security Considerations for IEEE 802.15.4 Networks,' Proceedings of the 3rd ACM workshop on Wireless security, pp.32-42, Philadelphia, PA,USA, 2004