Abstract
This paper describes security features of ZigBee and Bluetooth PAN wireless networks. On examples of those two wireless systems are demonstrated challenges associated with utilization of present wireless systems for applications requiring secure data exchange. Recent penetration of wireless technologies into building and process automation applications even increases the need to fully understand the limitations of the security concepts used.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
ZigBee Specification 1.0, ZigBee Alliance (2004)
IEEE 802.15.X, IEEE, http://www.ieee802.org/15/
Advanced Encryption Standard AES: http://advanced-encryption-standard.iqnaut.net/
Krasner, J.: Using Elliptic Curve Cryptography (ECC) for Enhanced Embedded Security, Embedded Market Forecasters, American Technology International, Inc. (2004)
Ferguson, N., Schneier, B.: Practical cryptography. Wiley, Chichester (2003)
Pereira, R.: ZigBee And ECC Secure Wireless Networks, Electronic Design (2004), www.elecdesign.com
Bluetooth Special Interest Group SIG: http://www.bluetooth.com
Bluetooth specification Version 1.1 (February 22, 2001)
Lu, Y., Meier, W., Vaudenay, S.: The Conditional Correlation Attack: A Practical Attack on Bluetooth Encryption. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, Springer, Heidelberg (2005)
Ceung, H.: How To: Building a BlueSniper Rifle (2005), http://www.tomsnetworking.com/Sections-article106-page1.php
Bernstein, D.: Cache-timing attacks on AES (2005), http://cr.yp.to/antiforgery/cachetiming-20050414.pdf
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Hyncica, O., Kacz, P., Fiedler, P., Bradac, Z., Kucera, P., Vrba, R. (2006). On Security of PAN Wireless Systems. In: Vassiliadis, S., Wong, S., Hämäläinen, T.D. (eds) Embedded Computer Systems: Architectures, Modeling, and Simulation. SAMOS 2006. Lecture Notes in Computer Science, vol 4017. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11796435_19
Download citation
DOI: https://doi.org/10.1007/11796435_19
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-36410-8
Online ISBN: 978-3-540-36411-5
eBook Packages: Computer ScienceComputer Science (R0)