Abstract
The latest version of ZigBee offers improvements over many aspects like low power consumption, flexibility and inexpensive deployment. However problems persist, as the enhanced protocol still has many security weaknesses due to the fact that constrained wireless sensor network devises cannot uses standard security protocols such as public key cryptography mechanisms. In this paper, we highlight relevant security concerns related to ZigBee security features, then we propose a new approach suitable for ZigBee enabled wireless sensor networks. The proposed solution decreases considerably the likelihood of successful attacks,and reduces security impact in the event of a node compromise. Lastly we discuss the security and performance related to the proposed scheme.
Original language | English |
---|---|
Pages (from-to) | 376-381 |
Number of pages | 6 |
Journal | Procedia Computer Science |
Volume | 37 |
DOIs | |
Publication status | Published - Jan 1 2014 |
Event | 5th International Conference on Emerging Ubiquitous Systems and Pervasive Networks, EUSPN 2014 and the 4th International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare, ICTH 2014 - Halifax, Canada Duration: Sep 22 2014 → Sep 25 2014 |
Fingerprint
All Science Journal Classification (ASJC) codes
- Computer Science(all)
Cite this
New security approach for ZigBee weaknesses. / Razouk, Wissam; Crosby, Garth V.; Sekkaki, Abderrahim.
In: Procedia Computer Science, Vol. 37, 01.01.2014, p. 376-381.Research output: Contribution to journal › Conference article
}
TY - JOUR
T1 - New security approach for ZigBee weaknesses
AU - Razouk, Wissam
AU - Crosby, Garth V.
AU - Sekkaki, Abderrahim
PY - 2014/1/1
Y1 - 2014/1/1
N2 - The latest version of ZigBee offers improvements over many aspects like low power consumption, flexibility and inexpensive deployment. However problems persist, as the enhanced protocol still has many security weaknesses due to the fact that constrained wireless sensor network devises cannot uses standard security protocols such as public key cryptography mechanisms. In this paper, we highlight relevant security concerns related to ZigBee security features, then we propose a new approach suitable for ZigBee enabled wireless sensor networks. The proposed solution decreases considerably the likelihood of successful attacks,and reduces security impact in the event of a node compromise. Lastly we discuss the security and performance related to the proposed scheme.
AB - The latest version of ZigBee offers improvements over many aspects like low power consumption, flexibility and inexpensive deployment. However problems persist, as the enhanced protocol still has many security weaknesses due to the fact that constrained wireless sensor network devises cannot uses standard security protocols such as public key cryptography mechanisms. In this paper, we highlight relevant security concerns related to ZigBee security features, then we propose a new approach suitable for ZigBee enabled wireless sensor networks. The proposed solution decreases considerably the likelihood of successful attacks,and reduces security impact in the event of a node compromise. Lastly we discuss the security and performance related to the proposed scheme.
UR - http://www.scopus.com/inward/record.url?scp=84930322132&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84930322132&partnerID=8YFLogxK
U2 - 10.1016/j.procs.2014.08.056
DO - 10.1016/j.procs.2014.08.056
M3 - Conference article
AN - SCOPUS:84930322132
VL - 37
SP - 376
EP - 381
JO - Procedia Computer Science
JF - Procedia Computer Science
SN - 1877-0509
ER -