Author_Institution :
Dept. of Comput. Technol., Shunde Polytech., Foshan, China
Abstract :
The security of wireless sensor networks is very important. In order to research the security of wireless sensor networks based on the ZigBee standard, this paper firstly introduces the stack architecture of the ZigBee protocol, security suites, stating the codes of encryption and data integrity authentication algorithm. Then, it analyzes the security defects on wireless sensor networks- e. g., channel interference, address assignment conflict and route found flooding in the networking; and key-tapping, defects in the encryption without integrity protection and no identity certification in the security services. Finally, it offers some coping methods: setting standby channel setting, improving routing algorithm, using asymmetric authentication and key exchange based on elliptic curve cryptography, etc.
Keywords :
cryptographic protocols; data integrity; message authentication; telecommunication security; wireless sensor networks; ZigBee standard protocol; address assignment conflict; channel interference; code encryption algorithm; data integrity authentication algorithm; elliptic curve key exchange cryptography; identity certification; key-tapping; route found flooding; wireless sensor network security; Authentication; Code standards; Communication system security; Cryptography; Data security; Identity-based encryption; Interference; Wireless application protocol; Wireless sensor networks; ZigBee; AES; channel defect; eavesdropping; security; zigbee;