Advertisement

An Enhanced Trust Center Based Authentication in ZigBee Networks

  • Kyunghwa Lee
  • Joohyun Lee
  • Bongduk Zhang
  • Jaeho Kim
  • Yongtae Shin
Part of the Lecture Notes in Computer Science book series (LNCS, volume 5576)

Abstract

The The ZigBee is a type of LR-WPAN technology that as low data rate, low power consumption, low cost, wireless networking protocol targeted towards automation and remote control applications. The ZigBee standard defines a comprehensive security architecture and management model, including frame encryption, authentication, and integrity at each layer of the ZigBee protocol stack. In addition, ZigBee defines a Trust Center that provides the essential security functions of key management, network management, and device configuration. But ZigBee specification describes only intra-PAN networks, and the network size is increasing, the energy required for authentication is larger. In this paper, we outlined the basic Trust Center based Authentication (TCA) mechanism. And we propose an enhanced TCA mechanism which improve the performance of current standards in ZigBee Network with mobility node. Through simulation experiments, we showed that the proposed scheme is more energy and memory effective than current scheme. Our scheme provides an optimal and feasible authentication of mobility node in ZigBee networks and is suited for large ZigBee Network.

Keywords

ZigBee sensor security sensor authentication key management 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    ZigBee Alliance Document, ZigBee Specification Pro/2007 (2007)Google Scholar
  2. 2.
    IEEE Std 802.15.4: Wireless Medium Access Control(MAC) and Physical Layer (PHY) Specifications for Low-Rate Wireless Personal Area Networks (LR-WPANs) (2003)Google Scholar
  3. 3.
    Perrig, A., et al.: TESLA: Multicast Source Authentication Transform Introduction. IETF working draft, draft-ietf-msec-tesla-intro-01.txtGoogle Scholar
  4. 4.
    Perrig, C., et al.: SPINS: Security Protocols for Sensor Networks. ACM Wireless Networks 8(5), 521–534 (2002)CrossRefzbMATHGoogle Scholar
  5. 5.
    Zhu, S., Setia, S., Jajodia, S.: LEAP: Efficient Security Mechanism for Large-Scale Distributed Sensor Networks. In: Proc. 10th ACM Conf. Computer and Community Security (CCS 2003), Washington, DC (October 2003)Google Scholar
  6. 6.
    Bohge, M., Trappe, W.: An Authentication Framework for Hierarchical Ad Hoc Sensor Networks. In: Proc. 2nd ACM Workshop on Wireless Security, San Diego, CA (2003)Google Scholar
  7. 7.
    Zhou, Y., Fang, Y.: Securing Wireless Sensor Networks:A Survey. IEEE Communication 10(3) (October 2008)Google Scholar
  8. 8.
    Mhatre, V., Rosenberg, C.: Design guidelines for wireless sensor. networks: communication, clustering and aggregation. Ad Hoc. Networks, 45–63 (2004)Google Scholar
  9. 9.
    Sanchez, D.S., Baldus, H.: A Deterministic Pairwise Key Pre-Distribution Scheme for Mobile Sensor Networks. In: Proc. 1st IEEE Int’l. Conf Security and Privacy for Emerging Areas in Communications Networks (SecureComm 2005) (2005)Google Scholar
  10. 10.
    Khan, M., Amini, F., Mišić, J.: Key exchange in 802.15.4 networks and its performance implications. In: Cao, J., Stojmenovic, I., Jia, X., Das, S.K. (eds.) MSN 2006. LNCS, vol. 4325, pp. 497–508. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  11. 11.
    Ren, K., et al.: On Broadcast Authentication in Wireless Sensor Networks. In: Proc. Conf. Wireless Algorithms, Systems, and Applications, Xi’an, China (August 2006)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2009

Authors and Affiliations

  • Kyunghwa Lee
    • 1
  • Joohyun Lee
    • 1
  • Bongduk Zhang
    • 1
  • Jaeho Kim
    • 1
  • Yongtae Shin
    • 1
  1. 1.Room 407 Information Science B/DSoongsil UniversitySeoulSouth Korea

Personalised recommendations