Abstract
ZigBee technology is designed to be used on applications that require low data rate, low-cost, low power consumption. However, the ZigBee networks are vulnerable to various attacks. In this paper, we have proposed an Identity-based authentication protocol for a ZigBee network structured to have multiple clusters consisting of one coordinator and many devices. Further more, we have designed a secure protocol used for exchanging public parameters between two clusters. Our proposal could realize secure, fast, low-cost and scalable authentication between any two nodes in a clustered ZigBee network.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Yick, J., Mukherjee, B., Ghosal, D.: Wireless sensor network survey. Computer Networks 52, 2292–2330 (2008)
Zheng, J.L., Lee, M.J., Anshel, M.: Toward Secure Low Rate Wireless Personal Area Networks. IEEE Transactions On Mobile Computing 5(10) (2006)
ZigBee-2007 Specification, ZigBee Alliance (2008)
Nguyen, S.T., Rong, C.M.: ZigBee Security Using Identity-Based Cryptography. In: Xiao, B., Yang, L.T., Ma, J., Muller-Schloer, C., Hua, Y. (eds.) ATC 2007. LNCS, vol. 4610, pp. 3–12. Springer, Heidelberg (2007)
Lee, S.H., Kim, J.H.: Design of Authentication Protocol for LR-WPAN using Pre-Authentication Mechanism. In: Consumer Communications and Networking Conference (2009)
Yüksel, E., Nielson, H.R., Nielson. F.: A Secure Key Establishment Protocol for ZigBee Wireless Sensor Networks. In: 24th International Symposium on Computer and Information Sciences (2009)
Boneh, D., Franklin, M.: Identity based encryption from the Weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213–229. Springer, Heidelberg (2001)
IEEE Std 802.15.4-2003, Wireless Medium Access Control and Physical Layer Specifications for Low-Rate Wireless Personal Area Networks, IEEE (2003)
Tan, C.C., Wang, H.D., Zhong, S., Li, H.: Body Sensor Network Security: An Identity-Based Cryptography Approach. In: ACM WiSec, Alexandria, VA, pp. 148–153 (2008)
Cha, J., Cheon, J.: An Identity-Based Signature from Gap Diffie-Hellman Groups. In: Desmedt, Y.G. (ed.) PKC 2003. LNCS, vol. 2567, pp. 18–30. Springer, Heidelberg (2002)
Galbraith, S.D., Harrison, K., Soldera, D.: Implementing the Tate pairing. In: Fieker, C., Kohel, D.R. (eds.) ANTS 2002. LNCS, vol. 2369, pp. 324–337. Springer, Heidelberg (2002)
Piotr, S., Martin, C.: Proceedings of 18th Internatonal Conference on Computer Communications and Networks. ICCCN (2009)
Mao, W.B.: Modern Cryptography: Theory and Practice. Publishing House of Electronic Industry, Beijing (2004)
Dolev, D., Yao, A.C.: On the security of public key protocols. In: proceedings of IEEE 22nd Annual symposium on foundations of computer science (1981)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Chen, W., Zhang, X., Tian, D., Fu, Z. (2010). An Identity-Based Authentication Protocol for Clustered ZigBee Network. In: Huang, DS., Zhang, X., Reyes GarcÃa, C.A., Zhang, L. (eds) Advanced Intelligent Computing Theories and Applications. With Aspects of Artificial Intelligence. ICIC 2010. Lecture Notes in Computer Science(), vol 6216. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-14932-0_63
Download citation
DOI: https://doi.org/10.1007/978-3-642-14932-0_63
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-14931-3
Online ISBN: 978-3-642-14932-0
eBook Packages: Computer ScienceComputer Science (R0)