By Topic

Study on Security of Wireless Sensor Network Based on ZigBee Standard

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

1 Author(s)
Bin Yang ; Dept. of Comput. Technol., Shunde Polytech., Foshan, China

The security of wireless sensor networks is very important. In order to research the security of wireless sensor networks based on the ZigBee standard, this paper firstly introduces the stack architecture of the ZigBee protocol, security suites, stating the codes of encryption and data integrity authentication algorithm. Then, it analyzes the security defects on wireless sensor networks- e. g., channel interference, address assignment conflict and route found flooding in the networking; and key-tapping, defects in the encryption without integrity protection and no identity certification in the security services. Finally, it offers some coping methods: setting standby channel setting, improving routing algorithm, using asymmetric authentication and key exchange based on elliptic curve cryptography, etc.

Published in:

Computational Intelligence and Security, 2009. CIS '09. International Conference on  (Volume:2 )

Date of Conference:

11-14 Dec. 2009