J4 ›› 2012, Vol. 25 ›› Issue (2): 59-66.doi: 10.3976/j.issn.1002-4026.2012.02.013

• Content • Previous Articles     Next Articles

A survey of security architecture of ZigBee protocol stack

 HUANG Tai-Bo1,3, ZHAO Hua-Wei2,3, PAN Jin-Qiu1, NIE Pei-Yao1, YANG Ze-Jun3,4   

  1. 1.School of Managment Science and Engineering,Shandong University of Finance and Economics,Jinan 250014,China; 2.School of Computer Science and Technology, Shandong University of Finance and Economics, Jinan 250014, China; 3.Shandong Provincial Key Laboratory of Computer Networks, Shandong Computer Science Center, Jinan 250014, China; 4.School of Information Science and Engineering, Shandong Normal University, Jinan 250014, China
  • Received:2011-10-20 Published:2012-04-20 Online:2012-04-20

Abstract:

         ZigBee, an emerging wireless sensor network technology, has wide application and its security is increasingly significant. This paper presents its security architecture, security service, security model, security components, security keys and trust center and security policy of each layer. The paper also gives its security implementation steps. The paper eventually proposes a new idea for its key management, which is favorable to its security enhancement.

Key words: ZigBee, wireless sensor network, security architecture, trust center

CLC Number: 

  • TN926+.23

Open Access This article is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License (CC BY-NC 4.0), which permits third parties to freely share (i.e., copy and redistribute the material in any medium or format) and adapt (i.e., remix, transform, or build upon the material) the articles published in this journal, provided that appropriate credit is given, a link to the license is provided, and any changes made are indicated. The material may not be used for commercial purposes. For details of the CC BY-NC 4.0 license, please visit: https://creativecommons.org/licenses/by-nc/4.0