Title | ||
---|---|---|
A novel elliptical curve ID cryptography protocol for multi-hop ZigBee sensor networks |
Abstract | ||
---|---|---|
ZigBee uses the network security and application profile layers of the IEEE 802.15.4 and ZigBee Alliance standards for reliable, low-powered, wireless data communications. However, the ZigBee protocol has some security weaknesses for newly joining devices. In this paper, these weaknesses are analyzed and a novel elliptical curve identity-based cryptography (ECIC) protocol is presented to improve the security level of ZigBee networks. The proposed method provides perfect forward secrecy and enables network key transmission between nodes. Therefore, the traffic concentrated on the trustcenter is diminished, and the network efficiency is improved by reducing the key establishment time and processing burden on each sensor node, thereby reducing the overall energy consumption of the sensor network. Copyright © 2010 John Wiley & Sons, Ltd. (The proposed elliptical curve identity-based cryptography (ECIC) ZigBee provides perfect forward secrecy and enables network key transmission between nodes. As a result the protocol can reduce the traffic concentrated on the trustcenter and increase the network efficiency compared to when using the ZigBee protocol based on the network security and application profile layers of the IEEE 802.15.4 and ZigBee Alliance. Key complexity comparison of the ZigBee protocol (a) and the ECIC ZigBee protocol (b) is illustrated.) |
Year | DOI | Venue |
---|---|---|
2012 | 10.1002/wcm.947 | Wireless Communications and Mobile Computing |
Keywords | Field | DocType |
cryptography protocol,zigbee protocol,network security,zigbee alliance standard,novel elliptical curve id,network efficiency,identity-based cryptography,network key transmission,multi-hop zigbee sensor network,zigbee alliance,ecic zigbee protocol,application profile layer,zigbee network,sensor network,elliptic curve | Sensor node,Application profile,Computer science,Cryptography,Network security,Computer network,Forward secrecy,Wireless sensor network,Energy consumption,NeuRFon | Journal |
Volume | Issue | ISSN |
12 | 2 | 1530-8669 |
Citations | PageRank | References |
4 | 0.41 | 14 |
Authors | ||
3 |
Name | Order | Citations | PageRank |
---|---|---|---|
Hyunjue Kim | 1 | 15 | 1.68 |
Chang Hyun Kim | 2 | 47 | 21.59 |
Jong-Moon Chung | 3 | 12 | 1.25 |