An Enhanced Trust Center Based Authentication in ZigBee Networks
The The ZigBee is a type of LR-WPAN technology that as low data rate, low power consumption, low cost, wireless networking protocol targeted towards automation and remote control applications. The ZigBee standard defines a comprehensive security architecture and management model, including frame encryption, authentication, and integrity at each layer of the ZigBee protocol stack. In addition, ZigBee defines a Trust Center that provides the essential security functions of key management, network management, and device configuration. But ZigBee specification describes only intra-PAN networks, and the network size is increasing, the energy required for authentication is larger. In this paper, we outlined the basic Trust Center based Authentication (TCA) mechanism. And we propose an enhanced TCA mechanism which improve the performance of current standards in ZigBee Network with mobility node. Through simulation experiments, we showed that the proposed scheme is more energy and memory effective than current scheme. Our scheme provides an optimal and feasible authentication of mobility node in ZigBee networks and is suited for large ZigBee Network.
KeywordsZigBee sensor security sensor authentication key management
Unable to display preview. Download preview PDF.
- 1.ZigBee Alliance Document, ZigBee Specification Pro/2007 (2007)Google Scholar
- 2.IEEE Std 802.15.4: Wireless Medium Access Control(MAC) and Physical Layer (PHY) Specifications for Low-Rate Wireless Personal Area Networks (LR-WPANs) (2003)Google Scholar
- 3.Perrig, A., et al.: TESLA: Multicast Source Authentication Transform Introduction. IETF working draft, draft-ietf-msec-tesla-intro-01.txtGoogle Scholar
- 5.Zhu, S., Setia, S., Jajodia, S.: LEAP: Efficient Security Mechanism for Large-Scale Distributed Sensor Networks. In: Proc. 10th ACM Conf. Computer and Community Security (CCS 2003), Washington, DC (October 2003)Google Scholar
- 6.Bohge, M., Trappe, W.: An Authentication Framework for Hierarchical Ad Hoc Sensor Networks. In: Proc. 2nd ACM Workshop on Wireless Security, San Diego, CA (2003)Google Scholar
- 7.Zhou, Y., Fang, Y.: Securing Wireless Sensor Networks:A Survey. IEEE Communication 10(3) (October 2008)Google Scholar
- 8.Mhatre, V., Rosenberg, C.: Design guidelines for wireless sensor. networks: communication, clustering and aggregation. Ad Hoc. Networks, 45–63 (2004)Google Scholar
- 9.Sanchez, D.S., Baldus, H.: A Deterministic Pairwise Key Pre-Distribution Scheme for Mobile Sensor Networks. In: Proc. 1st IEEE Int’l. Conf Security and Privacy for Emerging Areas in Communications Networks (SecureComm 2005) (2005)Google Scholar
- 11.Ren, K., et al.: On Broadcast Authentication in Wireless Sensor Networks. In: Proc. Conf. Wireless Algorithms, Systems, and Applications, Xi’an, China (August 2006)Google Scholar