New security approach for ZigBee weaknesses

Wissam Razouk, Garth V. Crosby, Abderrahim Sekkaki

Research output: Contribution to journalConference article

7 Citations (Scopus)

Abstract

The latest version of ZigBee offers improvements over many aspects like low power consumption, flexibility and inexpensive deployment. However problems persist, as the enhanced protocol still has many security weaknesses due to the fact that constrained wireless sensor network devises cannot uses standard security protocols such as public key cryptography mechanisms. In this paper, we highlight relevant security concerns related to ZigBee security features, then we propose a new approach suitable for ZigBee enabled wireless sensor networks. The proposed solution decreases considerably the likelihood of successful attacks,and reduces security impact in the event of a node compromise. Lastly we discuss the security and performance related to the proposed scheme.

Fingerprint

Zigbee
Wireless sensor networks
Public key cryptography
Network protocols
Electric power utilization

All Science Journal Classification (ASJC) codes

  • Computer Science(all)

Cite this

New security approach for ZigBee weaknesses. / Razouk, Wissam; Crosby, Garth V.; Sekkaki, Abderrahim.

In: Procedia Computer Science, Vol. 37, 01.01.2014, p. 376-381.

Research output: Contribution to journalConference article

Razouk, Wissam ; Crosby, Garth V. ; Sekkaki, Abderrahim. / New security approach for ZigBee weaknesses. In: Procedia Computer Science. 2014 ; Vol. 37. pp. 376-381.
@article{d18eb1297d5544dbad347e1b08a1fff1,
title = "New security approach for ZigBee weaknesses",
abstract = "The latest version of ZigBee offers improvements over many aspects like low power consumption, flexibility and inexpensive deployment. However problems persist, as the enhanced protocol still has many security weaknesses due to the fact that constrained wireless sensor network devises cannot uses standard security protocols such as public key cryptography mechanisms. In this paper, we highlight relevant security concerns related to ZigBee security features, then we propose a new approach suitable for ZigBee enabled wireless sensor networks. The proposed solution decreases considerably the likelihood of successful attacks,and reduces security impact in the event of a node compromise. Lastly we discuss the security and performance related to the proposed scheme.",
author = "Wissam Razouk and Crosby, {Garth V.} and Abderrahim Sekkaki",
year = "2014",
month = "1",
day = "1",
doi = "10.1016/j.procs.2014.08.056",
language = "English",
volume = "37",
pages = "376--381",
journal = "Procedia Computer Science",
issn = "1877-0509",
publisher = "Elsevier BV",

}

TY - JOUR

T1 - New security approach for ZigBee weaknesses

AU - Razouk, Wissam

AU - Crosby, Garth V.

AU - Sekkaki, Abderrahim

PY - 2014/1/1

Y1 - 2014/1/1

N2 - The latest version of ZigBee offers improvements over many aspects like low power consumption, flexibility and inexpensive deployment. However problems persist, as the enhanced protocol still has many security weaknesses due to the fact that constrained wireless sensor network devises cannot uses standard security protocols such as public key cryptography mechanisms. In this paper, we highlight relevant security concerns related to ZigBee security features, then we propose a new approach suitable for ZigBee enabled wireless sensor networks. The proposed solution decreases considerably the likelihood of successful attacks,and reduces security impact in the event of a node compromise. Lastly we discuss the security and performance related to the proposed scheme.

AB - The latest version of ZigBee offers improvements over many aspects like low power consumption, flexibility and inexpensive deployment. However problems persist, as the enhanced protocol still has many security weaknesses due to the fact that constrained wireless sensor network devises cannot uses standard security protocols such as public key cryptography mechanisms. In this paper, we highlight relevant security concerns related to ZigBee security features, then we propose a new approach suitable for ZigBee enabled wireless sensor networks. The proposed solution decreases considerably the likelihood of successful attacks,and reduces security impact in the event of a node compromise. Lastly we discuss the security and performance related to the proposed scheme.

UR - http://www.scopus.com/inward/record.url?scp=84930322132&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84930322132&partnerID=8YFLogxK

U2 - 10.1016/j.procs.2014.08.056

DO - 10.1016/j.procs.2014.08.056

M3 - Conference article

AN - SCOPUS:84930322132

VL - 37

SP - 376

EP - 381

JO - Procedia Computer Science

JF - Procedia Computer Science

SN - 1877-0509

ER -