A key-management scheme for distributed sensor networks
Proceedings of the 9th ACM conference on Computer and communications security
A survey of key management for secure group communication
ACM Computing Surveys (CSUR)
LEAP: efficient security mechanisms for large-scale distributed sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
Study of ZigBee Wireless Mesh Networks
HIS '09 Proceedings of the 2009 Ninth International Conference on Hybrid Intelligent Systems - Volume 02
Proceedings of the 5th ACM symposium on QoS and security for wireless and mobile networks
A time-based key management protocol for wireless sensor networks
ISPEC'07 Proceedings of the 3rd international conference on Information security practice and experience
Considerations on Security in ZigBee Networks
SUTC '10 Proceedings of the 2010 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing
A mutual-healing key distribution scheme in wireless sensor networks
Journal of Network and Computer Applications
A Key Management Protocol for Multiphase Hierarchical Wireless Sensor Networks
EUC '10 Proceedings of the 2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing
Increasing Resiliency in Multi-phase Wireless Sensor Networks
The Computer Journal
A novel vulnerability detection method for ZigBee MAC layer
International Journal of Grid and Utility Computing
Hi-index | 0.24 |
ZigBee is one of impartment wireless technologies now being widely deployed in wireless sensor networks (WSNs). However, ZigBee exhibits several security concerns especially insufficiently addressed key management mechanism. The security of WSNs has a direct reliance on secure and efficient key management. This leaves key management as a fundamental research topic in the field of WSNs security. Among the proposed key management schemes for WSNs security, the localized encryption and authentication protocol (LEAP) has been regarded as an efficient protocol over the last years. LEAP supports the establishment of four types of keys. The security of these keys is under the assumption that the initial deployment phase is secure and the initial key is erased from sensor nodes after the initialization phase. Whilst the initial key is used again for node addition after the initialization phase whereas the new node can be compromised before erasing the key. A time-based key management scheme rethought the security of LEAP. We show the deficiency of the time-based key management scheme and developed an enhanced key management scheme for multi-phase ZigBee architecture in this paper. We show the proposed comprehensive key management solution keeps forward and backward secrecy and suits the application requirements and constraints through analysis and simulation.