The International Conference on Information Network 2012 2012
DOI: 10.1109/icoin.2012.6164409
|View full text |Cite
|
Sign up to set email alerts
|

An enhanced key management using ZigBee Pro for wireless sensor networks

Abstract: In this paper, we propose an enhanced key management mechanism using ECDH(Elliptic Curve Diffie-Hellman) and subMAC for wireless sensor networks using ZigBee. ZigBee consumes low power and provides security in wireless sensor networks. ZigBee Pro enhances security and supports a large number of applications. Despite enhanced security, ZigBee Pro has vulnerabilities of key management, i.e., weakness of key distribution. We use ECDH for secure key distribution and subMAC to overcome the weakness of ECDH, i.e., n… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 12 publications
(8 citation statements)
references
References 10 publications
0
8
0
Order By: Relevance
“…In every of the former two steps with Coordinator, Router, and End Device. Median execution time in criterion safely method [6] is 0.5156 seconds, and in standard-ECDH [6] it is 0.5778 seconds; the contrast is 0.0622 seconds. While this difference compare to the median execution time of criterion safely method, added 12%.…”
Section: Effectiveness Analyses Of Improved Key Mechanismmentioning
confidence: 94%
See 2 more Smart Citations
“…In every of the former two steps with Coordinator, Router, and End Device. Median execution time in criterion safely method [6] is 0.5156 seconds, and in standard-ECDH [6] it is 0.5778 seconds; the contrast is 0.0622 seconds. While this difference compare to the median execution time of criterion safely method, added 12%.…”
Section: Effectiveness Analyses Of Improved Key Mechanismmentioning
confidence: 94%
“…[5]. [6] Kyung C et al Used elliptic curve Diffie Hellman (ECDH) [7] to improve the key administration schema and SubMAC for Wireless Sensor Networks to overcome the vulnerabilities of key management of ZigBee. ECDH used for providing the safely of key distribution and SubMAC to avoid the vulnerabilities in ECDH, especially the endorsement and Man-In-The-Middle attack.…”
Section: Zigbee Promentioning
confidence: 99%
See 1 more Smart Citation
“…Manju.V.C et al [1] in her paper Proposed method to defend denial of sleep attack the method consists of two parts, Network organization and Selective level authentication. Kyung Choi et al [2] in the paper uses zigbee for security advanced encryption standard (AES) algorithm, adds to a security model provided by IEEE 802.15.4.…”
Section: Background and Related Workmentioning
confidence: 99%
“…Manju.V.C suggested using "Network organization and Selective level authentication" to protect the denial of sleep attacks (Goudar & Kulkarni, 2015). Kyung Choi uses Zigbee, (AES) security algorithm, for safety, which contributes to the security protocol supported by IEEE 802.15.4 (Choi, Yun, Chae, & Kim, 2012). Martin Peres proposed creating a secret key by means of an alreadyshared key, called key derivation.…”
Section: Introductionmentioning
confidence: 99%