Open Science Research Excellence

Open Science Index

Commenced in January 2007 Frequency: Monthly Edition: International Publications Count: 29534


Select areas to restrict search in scientific publication database:
2076
AES and ECC Mixed for ZigBee Wireless Sensor Security
Abstract:
In this paper, we argue the security protocols of ZigBee wireless sensor network in MAC layer. AES 128-bit encryption algorithm in CCM* mode is secure transferred data; however, AES-s secret key will be break within nearest future. Efficient public key algorithm, ECC has been mixed with AES to rescue the ZigBee wireless sensor from cipher text and replay attack. Also, the proposed protocol can parallelize the integrity function to increase system performance.
Digital Object Identifier (DOI):

References:

[1] Li Chunqing, Zhang Jiancheng, "Research of ZigBee's data security and protection", International Forum on Computer Science-Technology and Applications 2009, IEEE, 2009, pp 298 - 302.
[2] ZigBee Alliance, Retrieved 2011, from http://www.zigbee.org/Standards/Overview.aspx
[3] ZigBee Alliance , "ZigBee and wireless radio frequency coexistence", white paper, published by ZigBee Alliance, June 2007, Retrieved 2011, from http://www.zigbee.org/imwp/idms/popups/pop_download.asp?contentID =11745
[4] Patrick Kinney, "ZigBee technology: wireless control that simply works", Communications design conference, vol 2, 2 October 2003. retrieved 2011, from http://www.zigbee.org/en/press_kits/latest/documents/white_papers/wp_ zigbeetechwireless_final.pdf
[5] Bin Yang, " Study on security of wireless sensor network based on ZigBee standard." International Conference on Computational Intelligence and Security, IEEE, 2009, pp 426 - 430.
[6] Doug Whiting, Russ Housley and Niels Ferguso, "Counter with CBCMAC (CCM) AES mode of operation", submitted to NIST, retrieved 2011, from http://csrc.nist.gov/groups/ST/toolkit/BCM/documents/proposedmodes/c cm/ccm.pdf
[7] Meng Qianqian and Bao Kejin, "Security analysis for wireless networks based on ZigBee", IEEE,vol 1, 2009, pp 158 - 160.
[8] Arvinderpal S. Wander, Nils Gura, Hans Eberle, Vipul Gupta, Sheueling Chang Shantz, "Energy analysis of public-key cryptography for wireless sensor networks", Third IEEE International conference on Pervasive Compting and Communications, IEEE Computer Society, 2005, pp 324- 328.
[9] Roy Pereira, "ZigBee and ECC secure wireless networks", August 09 2004, retrieved 2011, from http://electronicdesign.com/article/embedded-software/zigbee-and-eccsecure- wireless-networks8369.aspx.
[10] Jerry Krasne, "Using elliptic curve cryptography(ECC) for enhanced embedded security financial advantages of ECC over RSA or Diffie Hellman", Embedded Market Forecasters American Technology International, Inc., November 2004, retrieved 2011, from http://embeddedforecast.com/EMF-ECC-FINAL1204.pdf
[11] ZigBee Alliance, "The enduring value of symmetric encryption", white paper, August 2000, retrieved 2011 from http://www.partnerdata.it/files/WP-Symmetric%20Encryption.pdf.
[12] Zhen-rong Li, Yi-qi Zhuang, Chao Zhang and Gang Jin, "Low-power and area-optimized VLSI implementation of AES coprocessor for ZigBee system", The Journal of China Universities of Posts and Telecommunications (Elsevier), vol 16, Issue 3, June 2009, pp 89-94.
[13] Hyunjue Kim, Chang Hyun Kim and Jong-Moon Chung, "A novel elliptical curve id cryptography protocol for multi-hop ZigBee sensor networks", Wireless Communication and Mobile Computing Wirel. Commun. Mob. Comput. (2010), Wiley Interscience, JohnWiley & Sons, Ltd, 2010.
[14] Tadiwa Elisha Nyamasvisva, Halabi Hasbullah, "Multi-level security algorithm for random ZigBee wireless sensor networks", Information Technology (ITSim), 2010 International Symposium in Kuala Lumpur, IEEE, vol 2, 2010, pp 612 - 617.
[15] Jelena Misic, Vojislav Misic, "Wireless personal area networks performance interconnections and security with IEEE 802.15.4., John Wiley & Sons Ltd, 2008.
[16] NFIPS, "197: Announcing the advanced encryption standard (AES)", Information Technology Laboratory, National Institute of Standards and Technology, November 2001.
[17] S.A Vanston, "Next generation security for wireless: elliptic curve cryptography", Computers and Security, Elsevier, vol 22, no. 5, 2003,pp 412 - 415.
Vol:13 No:04 2019Vol:13 No:03 2019Vol:13 No:02 2019Vol:13 No:01 2019
Vol:12 No:12 2018Vol:12 No:11 2018Vol:12 No:10 2018Vol:12 No:09 2018Vol:12 No:08 2018Vol:12 No:07 2018Vol:12 No:06 2018Vol:12 No:05 2018Vol:12 No:04 2018Vol:12 No:03 2018Vol:12 No:02 2018Vol:12 No:01 2018
Vol:11 No:12 2017Vol:11 No:11 2017Vol:11 No:10 2017Vol:11 No:09 2017Vol:11 No:08 2017Vol:11 No:07 2017Vol:11 No:06 2017Vol:11 No:05 2017Vol:11 No:04 2017Vol:11 No:03 2017Vol:11 No:02 2017Vol:11 No:01 2017
Vol:10 No:12 2016Vol:10 No:11 2016Vol:10 No:10 2016Vol:10 No:09 2016Vol:10 No:08 2016Vol:10 No:07 2016Vol:10 No:06 2016Vol:10 No:05 2016Vol:10 No:04 2016Vol:10 No:03 2016Vol:10 No:02 2016Vol:10 No:01 2016
Vol:9 No:12 2015Vol:9 No:11 2015Vol:9 No:10 2015Vol:9 No:09 2015Vol:9 No:08 2015Vol:9 No:07 2015Vol:9 No:06 2015Vol:9 No:05 2015Vol:9 No:04 2015Vol:9 No:03 2015Vol:9 No:02 2015Vol:9 No:01 2015
Vol:8 No:12 2014Vol:8 No:11 2014Vol:8 No:10 2014Vol:8 No:09 2014Vol:8 No:08 2014Vol:8 No:07 2014Vol:8 No:06 2014Vol:8 No:05 2014Vol:8 No:04 2014Vol:8 No:03 2014Vol:8 No:02 2014Vol:8 No:01 2014
Vol:7 No:12 2013Vol:7 No:11 2013Vol:7 No:10 2013Vol:7 No:09 2013Vol:7 No:08 2013Vol:7 No:07 2013Vol:7 No:06 2013Vol:7 No:05 2013Vol:7 No:04 2013Vol:7 No:03 2013Vol:7 No:02 2013Vol:7 No:01 2013
Vol:6 No:12 2012Vol:6 No:11 2012Vol:6 No:10 2012Vol:6 No:09 2012Vol:6 No:08 2012Vol:6 No:07 2012Vol:6 No:06 2012Vol:6 No:05 2012Vol:6 No:04 2012Vol:6 No:03 2012Vol:6 No:02 2012Vol:6 No:01 2012
Vol:5 No:12 2011Vol:5 No:11 2011Vol:5 No:10 2011Vol:5 No:09 2011Vol:5 No:08 2011Vol:5 No:07 2011Vol:5 No:06 2011Vol:5 No:05 2011Vol:5 No:04 2011Vol:5 No:03 2011Vol:5 No:02 2011Vol:5 No:01 2011
Vol:4 No:12 2010Vol:4 No:11 2010Vol:4 No:10 2010Vol:4 No:09 2010Vol:4 No:08 2010Vol:4 No:07 2010Vol:4 No:06 2010Vol:4 No:05 2010Vol:4 No:04 2010Vol:4 No:03 2010Vol:4 No:02 2010Vol:4 No:01 2010
Vol:3 No:12 2009Vol:3 No:11 2009Vol:3 No:10 2009Vol:3 No:09 2009Vol:3 No:08 2009Vol:3 No:07 2009Vol:3 No:06 2009Vol:3 No:05 2009Vol:3 No:04 2009Vol:3 No:03 2009Vol:3 No:02 2009Vol:3 No:01 2009
Vol:2 No:12 2008Vol:2 No:11 2008Vol:2 No:10 2008Vol:2 No:09 2008Vol:2 No:08 2008Vol:2 No:07 2008Vol:2 No:06 2008Vol:2 No:05 2008Vol:2 No:04 2008Vol:2 No:03 2008Vol:2 No:02 2008Vol:2 No:01 2008
Vol:1 No:12 2007Vol:1 No:11 2007Vol:1 No:10 2007Vol:1 No:09 2007Vol:1 No:08 2007Vol:1 No:07 2007Vol:1 No:06 2007Vol:1 No:05 2007Vol:1 No:04 2007Vol:1 No:03 2007Vol:1 No:02 2007Vol:1 No:01 2007