2010
DOI: 10.1093/comjnl/bxq036
|View full text |Cite
|
Sign up to set email alerts
|

A Secure Key Establishment Protocol for ZigBee Wireless Sensor Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
9
0

Year Published

2011
2011
2023
2023

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 12 publications
(9 citation statements)
references
References 0 publications
0
9
0
Order By: Relevance
“…Very similar to ours is the work in [45], where the key establishment protocol of ZigBee [46] is specified in LySa [8,16] and statically analysed with a CFA. They discovered a security flaw arising because freshness is not guaranteed, and proposed a fix.…”
Section: Discussionmentioning
confidence: 86%
See 2 more Smart Citations
“…Very similar to ours is the work in [45], where the key establishment protocol of ZigBee [46] is specified in LySa [8,16] and statically analysed with a CFA. They discovered a security flaw arising because freshness is not guaranteed, and proposed a fix.…”
Section: Discussionmentioning
confidence: 86%
“…Security in IoT and cyber-physical systems has been addressed from a process algebraic perspective by a certain number of papers, e.g. [45,44,2]. An IoT protocol (the MQ Telemetry Transport 3.1) is formally model in terms of a timed message-passing process algebra [2].…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…In recent years, ZigBee has come to be regarded as one of the communication standards in wireless sensor networks (Yuksel, Nielson, and Nielson 2011); for instance ZigBee modules are sold by several companies such as NEC corporation, HITACHI, and TOKYO COSMOS ELECTRIC CO., LTD. It is primarily used for measurement and control.…”
Section: Zigbee Networkmentioning
confidence: 99%
“…The approach presented in this report is within the scope of the SENSORIA (Software Engineering for Service-Oriented Overlay Computers) project, and will form a preliminary version of one of the chapters in my PhD dissertation. The discovered flaw and the proposed secure protocols were recently published in a conference paper (see references [17]) and also accepted for journal publication.Acknowledgement This work has been partially supported by EU-FETPI Global Computing Project IST-2005-16004 SENSORIA.I would like to thank Hanne Riis Nielson and Flemming Nielson for the supervision and invaluable contribution in this work, and also for providing me with this opportunity to work on an international research project. I would also like to thank Gavin Lowe for kind discussions and feedback on fixing the flaw in the key establishment protocol.…”
mentioning
confidence: 99%