Security Enhancement for ZigBee and Bluetooth

With the development of wireless technology, the social daily life has an increasing relationship with the wireless networks and the issue of wireless network security has caught more and more attention. In this thesis, two new protocols for ZigBee security are proposed. For the first time public key technology has been used to enhance the security strength for ZigBee master key establishment. The proposed protocols strengthened ZigBee master key establishment security, which subsequently secure the establishment of the network key and link key, both derived from the master key. By integrating unbalanced RSA into the key establishment protocols, the new methods can distribute different computation amount to the ZigBee devices in communication based on their computational capacities. An efficient key establishment protocol for Bluetooth is proposed. It also utilizes public key technology to avoid the involvement of a third party and to improve the security strength. This proposed work requires fewer protocol steps and is thus faster than the existing similar works.

[1]  Jianjun Tan,et al.  Energy consumption research of AES encryption algorithm in ZigBee , 2014 .

[2]  Gianluca Dini,et al.  Considerations on Security in ZigBee Networks , 2010, 2010 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing.

[3]  Dan Boneh,et al.  TWENTY YEARS OF ATTACKS ON THE RSA CRYPTOSYSTEM , 1999 .

[4]  Marimuthu Palaniswami,et al.  Internet of Things (IoT): A vision, architectural elements, and future directions , 2012, Future Gener. Comput. Syst..

[5]  Kemal E. Tepe,et al.  Applying Unbalanced RSA to Authentication and Key Distribution in 802.11 , 2005 .

[6]  Yask Patel,et al.  ZIGBEE: A LOW POWER WIRELESS TECHNOLOGY FOR INDUSTRIAL APPLICATIONS , 2012 .

[7]  Howon Kim,et al.  Efficient group key management of ZigBee network for home automation , 2012, 2012 IEEE International Conference on Consumer Electronics (ICCE).

[8]  Yong Wang,et al.  A survey of security issues in wireless sensor networks , 2006, IEEE Communications Surveys & Tutorials.

[9]  Jelena V. Misic,et al.  The Cost of Security: Performance of ZigBee Key Exchange Mechanism in an 802.15.4 Beacon Enabled Cluster , 2006, 2006 IEEE International Conference on Mobile Ad Hoc and Sensor Systems.

[10]  Lee Yong Hua,et al.  Delivering high quality, secure speech communication through low data rate 802.15.4 WPAN , 2007, 2007 IEEE International Conference on Telecommunications and Malaysia International Conference on Communications.

[11]  Imrich Chlamtac,et al.  Configuring BlueStars: Multihop Scatternet Formation for Bluetooth Networks , 2003, IEEE Trans. Computers.

[12]  Uttam Ghosh,et al.  Considering security for ZigBee protocol using message authentication code , 2015, 2015 Annual IEEE India Conference (INDICON).

[13]  Muhammad Fahad Khan,et al.  Zigbee Based Home Appliances Controlling Through Spoken Commands Using Handheld Devices , 2013 .

[14]  N. Baker,et al.  ZigBee and Bluetooth strengths and weaknesses for industrial applications , 2005 .

[15]  Azizol Abdullah,et al.  AES and ECC Mixed for ZigBee Wireless Sensor Security , 2011 .

[16]  Saif Rahman Improved Bluetooth Key Exchange using Unbalanced RSA , 2008 .

[17]  Davide Brunelli,et al.  Wireless Sensor Networks , 2012, Lecture Notes in Computer Science.

[18]  D. Egan The emergence of ZigBee in building automation and industrial control , 2005 .

[19]  Xiaojiang Du,et al.  A survey of key management schemes in wireless sensor networks , 2007, Comput. Commun..

[20]  Azizah Abdul Manaf,et al.  A survey on key management of zigbee network , 2013 .

[21]  T. Lennvall,et al.  A comparison of WirelessHART and ZigBee for industrial applications , 2008, 2008 IEEE International Workshop on Factory Communication Systems.

[22]  Yongtae Shin,et al.  An Enhanced Trust Center Based Authentication in ZigBee Networks , 2009, ISA.

[23]  Bharat K. Bhargava,et al.  Tree-Based Data Broadcast in IEEE 802.15.4 and ZigBee Networks , 2006, IEEE Transactions on Mobile Computing.