J4 ›› 2012, Vol. 25 ›› Issue (2): 59-66.doi: 10.3976/j.issn.1002-4026.2012.02.013

• Content • Previous Articles     Next Articles

A survey of security architecture of ZigBee protocol stack

 HUANG Tai-Bo1,3, ZHAO Hua-Wei2,3, PAN Jin-Qiu1, NIE Pei-Yao1, YANG Ze-Jun3,4   

  1. 1.School of Managment Science and Engineering,Shandong University of Finance and Economics,Jinan 250014,China; 2.School of Computer Science and Technology, Shandong University of Finance and Economics, Jinan 250014, China; 3.Shandong Provincial Key Laboratory of Computer Networks, Shandong Computer Science Center, Jinan 250014, China; 4.School of Information Science and Engineering, Shandong Normal University, Jinan 250014, China
  • Received:2011-10-20 Online:2012-04-20 Published:2012-04-20

Abstract:

         ZigBee, an emerging wireless sensor network technology, has wide application and its security is increasingly significant. This paper presents its security architecture, security service, security model, security components, security keys and trust center and security policy of each layer. The paper also gives its security implementation steps. The paper eventually proposes a new idea for its key management, which is favorable to its security enhancement.

Key words: ZigBee, wireless sensor network, security architecture, trust center

CLC Number: 

  • TN926+.23