Identity-based cryptosystems and signature schemes
Proceedings of CRYPTO 84 on Advances in cryptology
Use of elliptic curves in cryptography
Lecture notes in computer sciences; 218 on Advances in cryptology---CRYPTO 85
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Identity-Based Encryption from the Weil Pairing
CRYPTO '01 Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology
Short Signatures from the Weil Pairing
ASIACRYPT '01 Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Energy Analysis of Public-Key Cryptography for Wireless Sensor Networks
PERCOM '05 Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications
Efficient pairing computation on supersingular Abelian varieties
Designs, Codes and Cryptography
TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks
IPSN '08 Proceedings of the 7th international conference on Information processing in sensor networks
CLTC: A Cluster-Based Topology Control Framework for Ad Hoc Networks
IEEE Transactions on Mobile Computing
Secure and efficient ID-based group key agreement fitted for Pay-TV
PCM'05 Proceedings of the 6th Pacific-Rim conference on Advances in Multimedia Information Processing - Volume Part II
New directions in cryptography
IEEE Transactions on Information Theory
A public key cryptosystem and a signature scheme based on discrete logarithms
IEEE Transactions on Information Theory
New multiparty authentication services and key agreement protocols
IEEE Journal on Selected Areas in Communications
Hi-index | 0.00 |
ZigBee uses the network security and application profile layers of the IEEE 802.15.4 and ZigBee Alliance standards for reliable, low-powered, wireless data communications. However, the ZigBee protocol has some security weaknesses for newly joining devices. In this paper, these weaknesses are analyzed and a novel elliptical curve identity-based cryptography (ECIC) protocol is presented to improve the security level of ZigBee networks. The proposed method provides perfect forward secrecy and enables network key transmission between nodes. Therefore, the traffic concentrated on the trustcenter is diminished, and the network efficiency is improved by reducing the key establishment time and processing burden on each sensor node, thereby reducing the overall energy consumption of the sensor network. Copyright © 2010 John Wiley & Sons, Ltd. (The proposed elliptical curve identity-based cryptography (ECIC) ZigBee provides perfect forward secrecy and enables network key transmission between nodes. As a result the protocol can reduce the traffic concentrated on the trustcenter and increase the network efficiency compared to when using the ZigBee protocol based on the network security and application profile layers of the IEEE 802.15.4 and ZigBee Alliance. Key complexity comparison of the ZigBee protocol (a) and the ECIC ZigBee protocol (b) is illustrated.)