Browse > Article
http://dx.doi.org/10.13089/JKIISC.2012.22.4.745

Secure Key Distribution Protocol for ZigBee Wireless Sensor Network  

Oh, Su-Min (Dankook University)
Choi, Soo-Kyeong (Dankook University)
Kwon, Ye-Jin (Dankook University)
Park, Chang-Seop (Dankook University)
Abstract
It is shown in this paper that Yuksel-Nielson's key distribution scheme is not secure against key de-synchronization attack even though their scheme supplement ZigBee-2007 specification's security problems. Furthermore, a new key distribution scheme is proposed, which is the one to fix the security weakness of Yuksel-Nielson's scheme, as well as its security and performance analysis to verify its effectiveness.
Keywords
ZigBee; Key Distribution Protocol; Security; Performance analysis;
Citations & Related Records
연도 인용수 순위
  • Reference
1 ZigBee Alliance, "ZigBee-2007 Specification," ZigBee Document 053474r17, Jan. 2008.
2 IEEE, "Wireless Medium Access Control and Physical Layer Specifications for Low-Rate Wireless Personal Area Networks," IEEE 802.15.4-2003, May 2003.
3 E. Yüksel, H. R. Nielson, and F. Nielson, "A Secure Key Establishment Protocol for ZigBee Wireless Sensor Networks," The Computer Journal, Vol. 54, No. 4, pp. 589-601, Apr. 2011.   DOI   ScienceOn
4 N. Sastry and D. Wagner, "Security considerations for IEEE 802.15.4 networks," Proceedings of the 2004 ACM workshop on Wireless security, pp. 32-42, Oct 2004.
5 M. Simek and P. Moravek, "Modeling of Energy Consumption of ZigBee Devices in Matlab Tool," Elektrorevue, Vol. 2, No. 3, pp. 41-46, Sep. 2011.
6 Jennic Inc, "Calculating 802.15.4 Data Rates," JN-AN-1035, Jennic Inc, Aug. 2006.
7 P. Radmand, M. Domingo, J. Singh, J. Arnedo, A. Talevski, S. Petersen and S. Carlsen, "ZigBee/ZigBee PRO security assessment based on compromised cryptographic keys," Proceedings of the 2010 International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, pp. 465-470, Nov. 2010.
8 H. Li, Z. Jia and X. Xue, "Application and Analysis of ZigBee Security Services Specification," 2010 Second International Conference on Networks Security,Computing, pp. 494-497, Apr. 2010.
9 G. Dini and M. Tiloca, "Considerations on Security in ZigBee Networks," Proceedings of the 2010 IEEE International Conference on SUTC, pp.58-65, Jun. 2010.
10 L. Gheorghe, R. Raazvan, and N. Tapus, "Energy-efficient Optimizations of the Authentication and Anti-replay Security Protocol for Wireless Sensor Networks," The Seventh International Conference on Networking and Services, pp. 201-207, May 2011.