Essays.club - Get Free Essays and Term Papers
Search

Zigbee Based Secured Wireless Data Transmission and Reception

Autor:   •  February 3, 2018  •  964 Words (4 Pages)  •  528 Views

Page 1 of 4

...

The ZigBee Security Architecture and Design

The ZigBee technology is a model of the LR-WPAN technology which built in the lower layers of the International IEE standard IEEE 802.15.4 LR-WPAN. The numerical 802.15.4 describes the lower level of the physical (PHY) and the Media Access Control (MAC) layer. However, in its standards the higher –level network and the Application layers are also defined as the security devices. The security is established within the technology by the fact that the ZigBee technology applies the security services defined in the 802.15.4 standard to secure the MAC frames. To facilitate the 802.15.4 standards security services the ZigBee does develop its security model and security services at both the Network (NWK) and Application (APS) layers. This enables the provision of a comprehensive network security infrastructure for enabling the secure data transmission within the network (Lee, Lee, Zhang, Kim & Shin, 2009).

The ZigBee technology does apply three different keys of Master, Network, and Link to manage security within the established network to ensure secure data transmission. The Master keys are applied in the shared secret mode between two defined devices whereby they are concerned with key establishment procedure (SKKE) to generate the link keys. The Network keys do enhance security at eth Network layer on the ZiBee network. The Link keys are capable of securing the unicast messages between two designated communicating devices within the network at the application layer (Choi, Kim & Chae, 2013). The security of the ZigBee-based wireless network applies the security services that apply the techniques of key establishment and transport, frame protections and a network communicating device management.

[pic 1]

Figure 1: Shows the Transmitter block

---------------------------------------------------------------

References

Binoy, B. M., VijayKumar, P. M. & Divya Nair, D. (2015). A Security Enhanced Group Signature Based Authentication in ZIGBEE Networks. International Journal of Advanced Research Trends in Engineering and Technology (IJARTET) Vol. 2, Issue 5, May 2015. Retrieved from https://www.academia.edu/12937181/A_Security_Enhanced_Group_Signature_Based_Authentication_in_ZIGBEE_Networks

Choi, K., Mihui Kim, M. & Chae, K. (2013). “Secure and Lightweight Key Distribution with ZigBee Pro for Ubiquitous Sensor Networks,” International Journal of Distributed Sensor Networks, vol. 2013, Article ID 608380, 8 pages, 2013. doi:10.1155/2013/608380. Retrieved from http://www.hindawi.com/journals/ijdsn/2013/608380/cta/

Lee, K., Lee, J., Zhang, B., Kim, J. & Shin, Y. (2009). An Enhanced Trust Center Based Authentication in ZigBee Networks. Retrieved from http://link.springer.com/chapter/10.1007%2F978-3-642-02617-1_48#page-2

...

Download:   txt (6.7 Kb)   pdf (50.2 Kb)   docx (12.9 Kb)  
Continue for 3 more pages »
Only available on Essays.club