Enhanced Secure ZigBee Light Link Protocol Based on Network Key Update Mechanism

  • Jun YangEmail author
  • Ruiqing Liu
  • Baojiang Cui
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 773)


In recent years, the market demand for smart devices continues to increase. As a widely used communication technology, applications of ZigBee Light Link protocol and its security have received extensive attention in recent years. This article discusses the security of the ZigBee Light Link commissioning protocol. Based on the hash chain technology, this paper proposes a network key update protocol based on the security-enhanced ZLL protocol. In the end, the performance evaluation and comparison are given.


ZigBee Light Link Hash chain Key update 



This work is supported by National Natural Science Foundation of China (No. U1536122, No. 61502536).


  1. 1.
    ZigBee Alliance: Base Device Behavior Specification. Accessed 24 Feb 2016Google Scholar
  2. 2.
    Xi, X., Cheng, T., Xingyuan, F.: A health care system based on PLC and ZigBee. In: International Conference on Wireless Communications, Networking and Mobile Computing, pp. 3063–3k066Google Scholar
  3. 3.
    Wang, C., Kazem, S., Rittwik, J., Lusheng, J., Mahmoud, D.: Voice communications over ZigBee networks. IEEE Commun. Mag. 46(1), 121–127 (2008)CrossRefGoogle Scholar
  4. 4.
    Osipov, M.: A survey on Zigbee based wireless sensor networks in agriculture. In: Proceedings of the 3rd International Conference on Trendz in Information Sciences and Computing(TISC), pp. 85–89 (2011)Google Scholar
  5. 5.
    Muhammad, A., Ahsan, R.: An overview of home automation systems. In: International Conference on Robotics and Artificial Intelligence (ICRAI), pp. 27–31, 19 December 2016Google Scholar
  6. 6.
    Wang, J.: ZigBee light link and its applications. IEEE Wirel. Commun. 20(4), 6–7 (2013)CrossRefGoogle Scholar
  7. 7.
    ZigBee Alliance: ZigBee Light Link Standard (2012)Google Scholar
  8. 8.
    Wright, J.: KillerBee: practical ZigBee exploitation framework. In: ToorCon (2009)Google Scholar
  9. 9.
    Radmand, P., Domingo, M., Singh, J., Arnedo, J., Talevski, A., Petersen, S., Carlsen, S.: ZigBee/ZigBee PRO security assessment based on compromised cryptographic keys. Digital Ecosystem and Business Intelligence Institute, Curtin University of Technology, Perth, Australia (2010)Google Scholar
  10. 10.
    Olawumi, O., Haataja, K., Asikainen, M., Vidgren, N., Toivanen, P.: Three practical attacks against ZigBee security: attack scenario definitions, practical experiments, countermeasures, and lessons learned. In: IEEE 14th International Conference on Hybrid Intelligent Systems (HIS2014), at Kuwai.
  11. 11.
    Zillner, T.: ZigBee exploited: the good, the bad and the ugly. In: Black Hat (2015)Google Scholar
  12. 12.
    Nguyen, S.T., Rong, C.: ZigBee security using identity-based cryptography. In: Xiao, B., Yang, L.T., Ma, J., Muller-Schloer, C., Hua, Y. (eds.) ATC 2007. LNCS, vol. 4610, pp. 3–12. Springer, Heidelberg (2007). Scholar
  13. 13.
    Armknecht, F., Benenson, Z., Morgner, P., M¨uller, C.: On the security of the ZigBee light link touchlink commissioning procedure in Sicherheit. In: Lecture Notes in Informatics (LNI), Gesellschaft für Informatik, Bonn (2016)Google Scholar

Copyright information

© Springer International Publishing AG, part of Springer Nature 2019

Authors and Affiliations

  1. 1.School of Computer Science and TechnologyBeijing University of Posts and TelecommunicationsBeijingChina
  2. 2.National Engineering Laboratory for Mobile Network SecurityBeijing University of Posts and TelecommunicationsBeijingChina
  3. 3.School of Cyberspace SecurityBeijing University of Posts and TelecommunicationsBeijingChina

Personalised recommendations