2009 24th International Symposium on Computer and Information Sciences 2009
DOI: 10.1109/iscis.2009.5291816
|View full text |Cite
|
Sign up to set email alerts
|

A secure key establishment protocol for zigbee wireless sensor networks

Abstract: ZigBee is a wireless sensor network standard that defines network and application layers on top of IEEE 802.15.4's physical and medium access control layers. In the latest version of ZigBee, enhancements are prescribed for the security sublayer but we show in this paper that problems persist. In particular we show that the End-to-End Application Key Establishment Protocol is flawed and we propose a secure protocol instead. We do so by using formal verification techniques based on static program analysis and pr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2010
2010
2015
2015

Publication Types

Select...
1
1
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 17 publications
0
3
0
Order By: Relevance
“…Yüksel et al present the Zigbee symmetric key management scheme for low power WSNs [8]. The scheme provides network security and end-to-end security, by using three different types of keys: a master key, a network key and a link key.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Yüksel et al present the Zigbee symmetric key management scheme for low power WSNs [8]. The scheme provides network security and end-to-end security, by using three different types of keys: a master key, a network key and a link key.…”
Section: Related Workmentioning
confidence: 99%
“…After analyzing the possible attacks against WSNs [1], we chose for a distributive scheme that uses parts of the SPINS protocol [7] and the Zigbee 2007 security scheme [8]. We start by defining the general topology of the network in Sect.…”
Section: Proposed Key Management Architecturementioning
confidence: 99%
“…Establishing symmetric keys in WSNs is a challenging task due to the limited resources of sensor nodes [Yüksel et al 2011;Perrig et al 2004]. Specifically, the limited computational and memory constraints of sensors prohibit using public keys to establish pairwise symmetric keys, or just to predistribute on each node symmetric keys with all other nodes in the network.…”
Section: Introductionmentioning
confidence: 99%