Secure Key Distribution Protocol for ZigBee Wireless Sensor Network |
Oh, Su-Min
(Dankook University)
Choi, Soo-Kyeong (Dankook University) Kwon, Ye-Jin (Dankook University) Park, Chang-Seop (Dankook University) |
1 | ZigBee Alliance, "ZigBee-2007 Specification," ZigBee Document 053474r17, Jan. 2008. |
2 | IEEE, "Wireless Medium Access Control and Physical Layer Specifications for Low-Rate Wireless Personal Area Networks," IEEE 802.15.4-2003, May 2003. |
3 | E. Yüksel, H. R. Nielson, and F. Nielson, "A Secure Key Establishment Protocol for ZigBee Wireless Sensor Networks," The Computer Journal, Vol. 54, No. 4, pp. 589-601, Apr. 2011. DOI ScienceOn |
4 | N. Sastry and D. Wagner, "Security considerations for IEEE 802.15.4 networks," Proceedings of the 2004 ACM workshop on Wireless security, pp. 32-42, Oct 2004. |
5 | M. Simek and P. Moravek, "Modeling of Energy Consumption of ZigBee Devices in Matlab Tool," Elektrorevue, Vol. 2, No. 3, pp. 41-46, Sep. 2011. |
6 | Jennic Inc, "Calculating 802.15.4 Data Rates," JN-AN-1035, Jennic Inc, Aug. 2006. |
7 | P. Radmand, M. Domingo, J. Singh, J. Arnedo, A. Talevski, S. Petersen and S. Carlsen, "ZigBee/ZigBee PRO security assessment based on compromised cryptographic keys," Proceedings of the 2010 International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, pp. 465-470, Nov. 2010. |
8 | H. Li, Z. Jia and X. Xue, "Application and Analysis of ZigBee Security Services Specification," 2010 Second International Conference on Networks Security,Computing, pp. 494-497, Apr. 2010. |
9 | G. Dini and M. Tiloca, "Considerations on Security in ZigBee Networks," Proceedings of the 2010 IEEE International Conference on SUTC, pp.58-65, Jun. 2010. |
10 | L. Gheorghe, R. Raazvan, and N. Tapus, "Energy-efficient Optimizations of the Authentication and Anti-replay Security Protocol for Wireless Sensor Networks," The Seventh International Conference on Networking and Services, pp. 201-207, May 2011. |