Secured communication protocol for internetworking ZigBee cluster networks

Hyunjue Kim, Jong Moon Chung, Chang Hyun Kim

Research output: Contribution to journalArticle

15 Citations (Scopus)

Abstract

ZigBee uses the network security and application profile layers of the IEEE 802.15.4 and ZigBee Alliance standards for reliable, low-powered, wireless data communications. However, the ZigBee has problems of being less secure, and has a difficulty in distributing shared symmetric keys between each pair of nodes. In addition, the ZigBee protocol is inadequate for large sensor networks, which may consist of several very large scale clusters. In this paper, we first construct a secure ZigBee scheme for realistic scenarios consisting of a large network with several clusters containing coordinators and numerous devices. We present a new key management protocol for ZigBee networks, which can be used among participants of different clusters and analyze its performance.

Original languageEnglish
Pages (from-to)1531-1540
Number of pages10
JournalComputer Communications
Volume32
Issue number13-14
DOIs
Publication statusPublished - 2009 Aug 17

Fingerprint

Zigbee
Network protocols
Network security
Sensor networks
Communication

All Science Journal Classification (ASJC) codes

  • Computer Networks and Communications

Cite this

Kim, Hyunjue ; Chung, Jong Moon ; Kim, Chang Hyun. / Secured communication protocol for internetworking ZigBee cluster networks. In: Computer Communications. 2009 ; Vol. 32, No. 13-14. pp. 1531-1540.
@article{e26950f70cba45779e9238a8abf27c0f,
title = "Secured communication protocol for internetworking ZigBee cluster networks",
abstract = "ZigBee uses the network security and application profile layers of the IEEE 802.15.4 and ZigBee Alliance standards for reliable, low-powered, wireless data communications. However, the ZigBee has problems of being less secure, and has a difficulty in distributing shared symmetric keys between each pair of nodes. In addition, the ZigBee protocol is inadequate for large sensor networks, which may consist of several very large scale clusters. In this paper, we first construct a secure ZigBee scheme for realistic scenarios consisting of a large network with several clusters containing coordinators and numerous devices. We present a new key management protocol for ZigBee networks, which can be used among participants of different clusters and analyze its performance.",
author = "Hyunjue Kim and Chung, {Jong Moon} and Kim, {Chang Hyun}",
year = "2009",
month = "8",
day = "17",
doi = "10.1016/j.comcom.2009.05.014",
language = "English",
volume = "32",
pages = "1531--1540",
journal = "Computer Communications",
issn = "0140-3664",
publisher = "Elsevier",
number = "13-14",

}

Secured communication protocol for internetworking ZigBee cluster networks. / Kim, Hyunjue; Chung, Jong Moon; Kim, Chang Hyun.

In: Computer Communications, Vol. 32, No. 13-14, 17.08.2009, p. 1531-1540.

Research output: Contribution to journalArticle

TY - JOUR

T1 - Secured communication protocol for internetworking ZigBee cluster networks

AU - Kim, Hyunjue

AU - Chung, Jong Moon

AU - Kim, Chang Hyun

PY - 2009/8/17

Y1 - 2009/8/17

N2 - ZigBee uses the network security and application profile layers of the IEEE 802.15.4 and ZigBee Alliance standards for reliable, low-powered, wireless data communications. However, the ZigBee has problems of being less secure, and has a difficulty in distributing shared symmetric keys between each pair of nodes. In addition, the ZigBee protocol is inadequate for large sensor networks, which may consist of several very large scale clusters. In this paper, we first construct a secure ZigBee scheme for realistic scenarios consisting of a large network with several clusters containing coordinators and numerous devices. We present a new key management protocol for ZigBee networks, which can be used among participants of different clusters and analyze its performance.

AB - ZigBee uses the network security and application profile layers of the IEEE 802.15.4 and ZigBee Alliance standards for reliable, low-powered, wireless data communications. However, the ZigBee has problems of being less secure, and has a difficulty in distributing shared symmetric keys between each pair of nodes. In addition, the ZigBee protocol is inadequate for large sensor networks, which may consist of several very large scale clusters. In this paper, we first construct a secure ZigBee scheme for realistic scenarios consisting of a large network with several clusters containing coordinators and numerous devices. We present a new key management protocol for ZigBee networks, which can be used among participants of different clusters and analyze its performance.

UR - http://www.scopus.com/inward/record.url?scp=67650587292&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=67650587292&partnerID=8YFLogxK

U2 - 10.1016/j.comcom.2009.05.014

DO - 10.1016/j.comcom.2009.05.014

M3 - Article

AN - SCOPUS:67650587292

VL - 32

SP - 1531

EP - 1540

JO - Computer Communications

JF - Computer Communications

SN - 0140-3664

IS - 13-14

ER -