ZigBee Security Using Identity-Based Cryptography

  • Son Thanh Nguyen
  • Chunming Rong
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4610)


ZigBee is a specification defining a set of protocols and architecture for monitoring and control networks. With the advantages of high availability, low cost and low power consumption, ZigBee is ideal for both residential and industrial settings. This paper proposes an application of identity-based cryptography for security in ZigBee networks. The proposal enhances the security features in ZigBee networks while reduces the number of required keys.


Elliptic Curve Identity Information Public Parameter ZigBee Network Trust Center 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Blaser, M.: Enabling Security in Industrial Wireless Sensor Networks. Industrial Embedded Systems (2006)Google Scholar
  2. 2.
    Blaser, M.: Industrial-strength Security for ZigBee: The Case for Public-key Cryptography. Embedded Computing Design (2005)Google Scholar
  3. 3.
    Blaser, M.: Securing ZigBee: Building Robust, Reliable Sensor Networks. Portable Design (2006)Google Scholar
  4. 4.
    Boneh, D., Franklin, M.: Identity-based Encryption from the Weil Pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213–229. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  5. 5.
    Boyen, X.: Multipurpose Identity-based Signcryption: A Swiss Army Knife for Identity-based Cryptography. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 382–398. Springer, Heidelberg (2003)Google Scholar
  6. 6.
    Cocks, C.: An Identity-based Encryption Scheme Based on Quadratic Residues. In: Proceeding of 8th IMA International Conference on Cryptography and Coding, pp. 26–28 (2001)Google Scholar
  7. 7.
    Diffie, W., Hellman, M.: New Direction in Cryptography. IEEE Transactions on Information Theory 22, 644–654 (1976)zbMATHCrossRefMathSciNetGoogle Scholar
  8. 8.
    Frey, G., Muller, M., Ruck, H.: The Tate Pairing and the Discrete Algorithm Applied to Elliptic Curve Cryptosystems. IEEE Transactions on Information Theory 45, 1717–1718 (1999)zbMATHCrossRefMathSciNetGoogle Scholar
  9. 9.
    Gennaro, R., Jarecki, S., Krawczyk, H., Rabin, T.: Secure Distributed Key Generation for Discrete-Log Based Cryptosystems. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 295–310. Springer, Heidelberg (1999)Google Scholar
  10. 10.
    Hegland, A.M, Winjum, E., Mjolsnes, S.F, Rong, C., Kure, O., Spilling, P.: A Survey of Key Management in Ad Hoc Networks. IEEE Communications Surveys and Tutorial, 3rd Quarter, pp. 48–66 (2006)Google Scholar
  11. 11.
    IEEE Std 802.15.4-2003. Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for Low Rate Wireless Personal Area Networks (LR-WPANs), IEEE Computer Society (2003)Google Scholar
  12. 12.
    Koblitz, N.: Elliptic Curve Cryptosystems. Mathematics of Computation 48, 203–209 (1987)zbMATHCrossRefMathSciNetGoogle Scholar
  13. 13.
    Menezes, A., Okamoto, T., Vanstone, S.: Reducing Elliptic Curve Logarithms to Logarithms in a Finite Field. IEEE Transactions on Information Theory 39, 1639–1646 (1993)zbMATHCrossRefMathSciNetGoogle Scholar
  14. 14.
    National Institute of Standards and Technology.
  15. 15.
    Reddy, J.: ZigBee Security Specification Overview. ZigBee Open House presentation, Hong Kong (2005)Google Scholar
  16. 16.
    Shamir, A.: How to Share a Secret. Communications of the ACM 22, 612–613 (1979)zbMATHCrossRefMathSciNetGoogle Scholar
  17. 17.
    Shamir, A.: Identity-based Cryptosystems and Signature Schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985)CrossRefGoogle Scholar
  18. 18.
    Silverman, J.: The Arithmetic of Elliptic Curve. Springer, Heidelberg (1986)Google Scholar
  19. 19.
    Stallings, W.: Cryptography and Network Security: Principles and Practices, 3rd edn. Prentice-Hall, Englewood Cliffs (2003)Google Scholar
  20. 20.
    Veigner, C., Rong, C.: On Email Spamming Under the Shadow of Large Scale Use of Identity-Based Encryption. In: Yang, L.T., Jin, H., Ma, J., Ungerer, T. (eds.) ATC 2006. LNCS, vol. 4158, pp. 521–530. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  21. 21.
    Wheeler, A.: ZigBee Wireless Networks for Industrial Systems. White Paper,
  22. 22.
    ZigBee Alliance.
  23. 23.
    ZigBee Alliance. ZigBee Specification 1.1 (2005)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2007

Authors and Affiliations

  • Son Thanh Nguyen
    • 1
  • Chunming Rong
    • 1
  1. 1.Department of Electrical Engineering and Computer Science, University of StavangerNorway

Personalised recommendations