Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 6216))

Included in the following conference series:

  • 2251 Accesses

Abstract

ZigBee technology is designed to be used on applications that require low data rate, low-cost, low power consumption. However, the ZigBee networks are vulnerable to various attacks. In this paper, we have proposed an Identity-based authentication protocol for a ZigBee network structured to have multiple clusters consisting of one coordinator and many devices. Further more, we have designed a secure protocol used for exchanging public parameters between two clusters. Our proposal could realize secure, fast, low-cost and scalable authentication between any two nodes in a clustered ZigBee network.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Yick, J., Mukherjee, B., Ghosal, D.: Wireless sensor network survey. Computer Networks 52, 2292–2330 (2008)

    Article  Google Scholar 

  2. Zheng, J.L., Lee, M.J., Anshel, M.: Toward Secure Low Rate Wireless Personal Area Networks. IEEE Transactions On Mobile Computing 5(10) (2006)

    Google Scholar 

  3. ZigBee-2007 Specification, ZigBee Alliance (2008)

    Google Scholar 

  4. Nguyen, S.T., Rong, C.M.: ZigBee Security Using Identity-Based Cryptography. In: Xiao, B., Yang, L.T., Ma, J., Muller-Schloer, C., Hua, Y. (eds.) ATC 2007. LNCS, vol. 4610, pp. 3–12. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  5. Lee, S.H., Kim, J.H.: Design of Authentication Protocol for LR-WPAN using Pre-Authentication Mechanism. In: Consumer Communications and Networking Conference (2009)

    Google Scholar 

  6. Yüksel, E., Nielson, H.R., Nielson. F.: A Secure Key Establishment Protocol for ZigBee Wireless Sensor Networks. In: 24th International Symposium on Computer and Information Sciences (2009)

    Google Scholar 

  7. Boneh, D., Franklin, M.: Identity based encryption from the Weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213–229. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  8. IEEE Std 802.15.4-2003, Wireless Medium Access Control and Physical Layer Specifications for Low-Rate Wireless Personal Area Networks, IEEE (2003)

    Google Scholar 

  9. Tan, C.C., Wang, H.D., Zhong, S., Li, H.: Body Sensor Network Security: An Identity-Based Cryptography Approach. In: ACM WiSec, Alexandria, VA, pp. 148–153 (2008)

    Google Scholar 

  10. Cha, J., Cheon, J.: An Identity-Based Signature from Gap Diffie-Hellman Groups. In: Desmedt, Y.G. (ed.) PKC 2003. LNCS, vol. 2567, pp. 18–30. Springer, Heidelberg (2002)

    Google Scholar 

  11. Galbraith, S.D., Harrison, K., Soldera, D.: Implementing the Tate pairing. In: Fieker, C., Kohel, D.R. (eds.) ANTS 2002. LNCS, vol. 2369, pp. 324–337. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  12. Piotr, S., Martin, C.: Proceedings of 18th Internatonal Conference on Computer Communications and Networks. ICCCN (2009)

    Google Scholar 

  13. Mao, W.B.: Modern Cryptography: Theory and Practice. Publishing House of Electronic Industry, Beijing (2004)

    Google Scholar 

  14. Dolev, D., Yao, A.C.: On the security of public key protocols. In: proceedings of IEEE 22nd Annual symposium on foundations of computer science (1981)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Chen, W., Zhang, X., Tian, D., Fu, Z. (2010). An Identity-Based Authentication Protocol for Clustered ZigBee Network. In: Huang, DS., Zhang, X., Reyes García, C.A., Zhang, L. (eds) Advanced Intelligent Computing Theories and Applications. With Aspects of Artificial Intelligence. ICIC 2010. Lecture Notes in Computer Science(), vol 6216. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-14932-0_63

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-14932-0_63

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-14931-3

  • Online ISBN: 978-3-642-14932-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics