Abstract | ||
---|---|---|
ZigBee outlines a new suite of protocols targeted at low-rate, low-power devices and sensor nodes. ZigBee Specification includes a number of security provisions and options. The security model specified in the Smart Energy Profile seems bound to become the reference security model for most of ZigBee applications. In this paper we review this security model and highlight places where its specification presents concerns and possible inefficiencies in security management. Specifically, we show that the specification does not adequately address the forward security requirement so allowing a number of threats at the routing and application layer. Furthermore, we show inefficiencies in managing both the Network Key and devices certificates. Finally, we make some proposals to address these problems. |
Year | DOI | Venue |
---|---|---|
2010 | 10.1109/SUTC.2010.15 | Sensor Networks, Ubiquitous, and Trustworthy Computing |
Keywords | Field | DocType |
security management,network key,devices certificate,zigbee networks,forward security requirement,zigbee application,zigbee specification,smart energy profile,security model,security provision,reference security model,routing protocols,protocols,physical layer,network topology,security,topology,computer networks,intelligent sensors,routing,key management,pervasive computing,forward security | Security testing,Security through obscurity,Network security policy,Computer science,Computer security,Computer network,Security service,Cloud computing security,Security information and event management,Computer security model,Security management | Conference |
ISBN | Citations | PageRank |
978-1-4244-7087-7 | 17 | 1.35 |
References | Authors | |
5 | 2 |
Name | Order | Citations | PageRank |
---|---|---|---|
Gianluca Dini | 1 | 270 | 26.58 |
Marco Tiloca | 2 | 79 | 11.27 |