New security approach for ZigBee weaknesses

Wissam Razouk, Garth V. Crosby, Abderrahim Sekkaki

研究成果: ジャーナルへの寄稿Conference article

7 引用 (Scopus)

抄録

The latest version of ZigBee offers improvements over many aspects like low power consumption, flexibility and inexpensive deployment. However problems persist, as the enhanced protocol still has many security weaknesses due to the fact that constrained wireless sensor network devises cannot uses standard security protocols such as public key cryptography mechanisms. In this paper, we highlight relevant security concerns related to ZigBee security features, then we propose a new approach suitable for ZigBee enabled wireless sensor networks. The proposed solution decreases considerably the likelihood of successful attacks,and reduces security impact in the event of a node compromise. Lastly we discuss the security and performance related to the proposed scheme.

元の言語英語
ページ(範囲)376-381
ページ数6
ジャーナルProcedia Computer Science
37
DOI
出版物ステータス出版済み - 1 1 2014
イベント5th International Conference on Emerging Ubiquitous Systems and Pervasive Networks, EUSPN 2014 and the 4th International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare, ICTH 2014 - Halifax, カナダ
継続期間: 9 22 20149 25 2014

Fingerprint

Zigbee
Wireless sensor networks
Public key cryptography
Network protocols
Electric power utilization

All Science Journal Classification (ASJC) codes

  • Computer Science(all)

これを引用

New security approach for ZigBee weaknesses. / Razouk, Wissam; Crosby, Garth V.; Sekkaki, Abderrahim.

:: Procedia Computer Science, 巻 37, 01.01.2014, p. 376-381.

研究成果: ジャーナルへの寄稿Conference article

Razouk, Wissam ; Crosby, Garth V. ; Sekkaki, Abderrahim. / New security approach for ZigBee weaknesses. :: Procedia Computer Science. 2014 ; 巻 37. pp. 376-381.
@article{d18eb1297d5544dbad347e1b08a1fff1,
title = "New security approach for ZigBee weaknesses",
abstract = "The latest version of ZigBee offers improvements over many aspects like low power consumption, flexibility and inexpensive deployment. However problems persist, as the enhanced protocol still has many security weaknesses due to the fact that constrained wireless sensor network devises cannot uses standard security protocols such as public key cryptography mechanisms. In this paper, we highlight relevant security concerns related to ZigBee security features, then we propose a new approach suitable for ZigBee enabled wireless sensor networks. The proposed solution decreases considerably the likelihood of successful attacks,and reduces security impact in the event of a node compromise. Lastly we discuss the security and performance related to the proposed scheme.",
author = "Wissam Razouk and Crosby, {Garth V.} and Abderrahim Sekkaki",
year = "2014",
month = "1",
day = "1",
doi = "10.1016/j.procs.2014.08.056",
language = "English",
volume = "37",
pages = "376--381",
journal = "Procedia Computer Science",
issn = "1877-0509",
publisher = "Elsevier BV",

}

TY - JOUR

T1 - New security approach for ZigBee weaknesses

AU - Razouk, Wissam

AU - Crosby, Garth V.

AU - Sekkaki, Abderrahim

PY - 2014/1/1

Y1 - 2014/1/1

N2 - The latest version of ZigBee offers improvements over many aspects like low power consumption, flexibility and inexpensive deployment. However problems persist, as the enhanced protocol still has many security weaknesses due to the fact that constrained wireless sensor network devises cannot uses standard security protocols such as public key cryptography mechanisms. In this paper, we highlight relevant security concerns related to ZigBee security features, then we propose a new approach suitable for ZigBee enabled wireless sensor networks. The proposed solution decreases considerably the likelihood of successful attacks,and reduces security impact in the event of a node compromise. Lastly we discuss the security and performance related to the proposed scheme.

AB - The latest version of ZigBee offers improvements over many aspects like low power consumption, flexibility and inexpensive deployment. However problems persist, as the enhanced protocol still has many security weaknesses due to the fact that constrained wireless sensor network devises cannot uses standard security protocols such as public key cryptography mechanisms. In this paper, we highlight relevant security concerns related to ZigBee security features, then we propose a new approach suitable for ZigBee enabled wireless sensor networks. The proposed solution decreases considerably the likelihood of successful attacks,and reduces security impact in the event of a node compromise. Lastly we discuss the security and performance related to the proposed scheme.

UR - http://www.scopus.com/inward/record.url?scp=84930322132&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84930322132&partnerID=8YFLogxK

U2 - 10.1016/j.procs.2014.08.056

DO - 10.1016/j.procs.2014.08.056

M3 - Conference article

AN - SCOPUS:84930322132

VL - 37

SP - 376

EP - 381

JO - Procedia Computer Science

JF - Procedia Computer Science

SN - 1877-0509

ER -