Commenced in January 2007
Paper Count: 30680
AES and ECC Mixed for ZigBee Wireless Sensor Security
Abstract:In this paper, we argue the security protocols of ZigBee wireless sensor network in MAC layer. AES 128-bit encryption algorithm in CCM* mode is secure transferred data; however, AES-s secret key will be break within nearest future. Efficient public key algorithm, ECC has been mixed with AES to rescue the ZigBee wireless sensor from cipher text and replay attack. Also, the proposed protocol can parallelize the integrity function to increase system performance.
Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1056402Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2905
 Li Chunqing, Zhang Jiancheng, "Research of ZigBee's data security and protection", International Forum on Computer Science-Technology and Applications 2009, IEEE, 2009, pp 298 - 302.
 ZigBee Alliance, Retrieved 2011, from http://www.zigbee.org/Standards/Overview.aspx
 ZigBee Alliance , "ZigBee and wireless radio frequency coexistence", white paper, published by ZigBee Alliance, June 2007, Retrieved 2011, from http://www.zigbee.org/imwp/idms/popups/pop_download.asp?contentID =11745
 Patrick Kinney, "ZigBee technology: wireless control that simply works", Communications design conference, vol 2, 2 October 2003. retrieved 2011, from http://www.zigbee.org/en/press_kits/latest/documents/white_papers/wp_ zigbeetechwireless_final.pdf
 Bin Yang, " Study on security of wireless sensor network based on ZigBee standard." International Conference on Computational Intelligence and Security, IEEE, 2009, pp 426 - 430.
 Doug Whiting, Russ Housley and Niels Ferguso, "Counter with CBCMAC (CCM) AES mode of operation", submitted to NIST, retrieved 2011, from http://csrc.nist.gov/groups/ST/toolkit/BCM/documents/proposedmodes/c cm/ccm.pdf
 Meng Qianqian and Bao Kejin, "Security analysis for wireless networks based on ZigBee", IEEE,vol 1, 2009, pp 158 - 160.
 Arvinderpal S. Wander, Nils Gura, Hans Eberle, Vipul Gupta, Sheueling Chang Shantz, "Energy analysis of public-key cryptography for wireless sensor networks", Third IEEE International conference on Pervasive Compting and Communications, IEEE Computer Society, 2005, pp 324- 328.
 Roy Pereira, "ZigBee and ECC secure wireless networks", August 09 2004, retrieved 2011, from http://electronicdesign.com/article/embedded-software/zigbee-and-eccsecure- wireless-networks8369.aspx.
 Jerry Krasne, "Using elliptic curve cryptography(ECC) for enhanced embedded security financial advantages of ECC over RSA or Diffie Hellman", Embedded Market Forecasters American Technology International, Inc., November 2004, retrieved 2011, from http://embeddedforecast.com/EMF-ECC-FINAL1204.pdf
 ZigBee Alliance, "The enduring value of symmetric encryption", white paper, August 2000, retrieved 2011 from http://www.partnerdata.it/files/WP-Symmetric%20Encryption.pdf.
 Zhen-rong Li, Yi-qi Zhuang, Chao Zhang and Gang Jin, "Low-power and area-optimized VLSI implementation of AES coprocessor for ZigBee system", The Journal of China Universities of Posts and Telecommunications (Elsevier), vol 16, Issue 3, June 2009, pp 89-94.
 Hyunjue Kim, Chang Hyun Kim and Jong-Moon Chung, "A novel elliptical curve id cryptography protocol for multi-hop ZigBee sensor networks", Wireless Communication and Mobile Computing Wirel. Commun. Mob. Comput. (2010), Wiley Interscience, JohnWiley & Sons, Ltd, 2010.
 Tadiwa Elisha Nyamasvisva, Halabi Hasbullah, "Multi-level security algorithm for random ZigBee wireless sensor networks", Information Technology (ITSim), 2010 International Symposium in Kuala Lumpur, IEEE, vol 2, 2010, pp 612 - 617.
 Jelena Misic, Vojislav Misic, "Wireless personal area networks performance interconnections and security with IEEE 802.15.4., John Wiley & Sons Ltd, 2008.
 NFIPS, "197: Announcing the advanced encryption standard (AES)", Information Technology Laboratory, National Institute of Standards and Technology, November 2001.
 S.A Vanston, "Next generation security for wireless: elliptic curve cryptography", Computers and Security, Elsevier, vol 22, no. 5, 2003,pp 412 - 415.