Abstract
In recent years, the market demand for smart devices continues to increase. As a widely used communication technology, applications of ZigBee Light Link protocol and its security have received extensive attention in recent years. This article discusses the security of the ZigBee Light Link commissioning protocol. Based on the hash chain technology, this paper proposes a network key update protocol based on the security-enhanced ZLL protocol. In the end, the performance evaluation and comparison are given.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
ZigBee Alliance: Base Device Behavior Specification. Accessed 24 Feb 2016
Xi, X., Cheng, T., Xingyuan, F.: A health care system based on PLC and ZigBee. In: International Conference on Wireless Communications, Networking and Mobile Computing, pp. 3063–3k066
Wang, C., Kazem, S., Rittwik, J., Lusheng, J., Mahmoud, D.: Voice communications over ZigBee networks. IEEE Commun. Mag. 46(1), 121–127 (2008)
Osipov, M.: A survey on Zigbee based wireless sensor networks in agriculture. In: Proceedings of the 3rd International Conference on Trendz in Information Sciences and Computing(TISC), pp. 85–89 (2011)
Muhammad, A., Ahsan, R.: An overview of home automation systems. In: International Conference on Robotics and Artificial Intelligence (ICRAI), pp. 27–31, 19 December 2016
Wang, J.: ZigBee light link and its applications. IEEE Wirel. Commun. 20(4), 6–7 (2013)
ZigBee Alliance: ZigBee Light Link Standard (2012)
Wright, J.: KillerBee: practical ZigBee exploitation framework. In: ToorCon (2009)
Radmand, P., Domingo, M., Singh, J., Arnedo, J., Talevski, A., Petersen, S., Carlsen, S.: ZigBee/ZigBee PRO security assessment based on compromised cryptographic keys. Digital Ecosystem and Business Intelligence Institute, Curtin University of Technology, Perth, Australia (2010)
Olawumi, O., Haataja, K., Asikainen, M., Vidgren, N., Toivanen, P.: Three practical attacks against ZigBee security: attack scenario definitions, practical experiments, countermeasures, and lessons learned. In: IEEE 14th International Conference on Hybrid Intelligent Systems (HIS2014), at Kuwai. https://doi.org/10.1109/his.2014.7086198
Zillner, T.: ZigBee exploited: the good, the bad and the ugly. In: Black Hat (2015)
Nguyen, S.T., Rong, C.: ZigBee security using identity-based cryptography. In: Xiao, B., Yang, L.T., Ma, J., Muller-Schloer, C., Hua, Y. (eds.) ATC 2007. LNCS, vol. 4610, pp. 3–12. Springer, Heidelberg (2007). https://doi.org/10.1007/978-3-540-73547-2_3
Armknecht, F., Benenson, Z., Morgner, P., M¨uller, C.: On the security of the ZigBee light link touchlink commissioning procedure in Sicherheit. In: Lecture Notes in Informatics (LNI), Gesellschaft für Informatik, Bonn (2016)
Acknowledgement
This work is supported by National Natural Science Foundation of China (No. U1536122, No. 61502536).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer International Publishing AG, part of Springer Nature
About this paper
Cite this paper
Yang, J., Liu, R., Cui, B. (2019). Enhanced Secure ZigBee Light Link Protocol Based on Network Key Update Mechanism. In: Barolli, L., Xhafa, F., Javaid, N., Enokido, T. (eds) Innovative Mobile and Internet Services in Ubiquitous Computing. IMIS 2018. Advances in Intelligent Systems and Computing, vol 773. Springer, Cham. https://doi.org/10.1007/978-3-319-93554-6_32
Download citation
DOI: https://doi.org/10.1007/978-3-319-93554-6_32
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-93553-9
Online ISBN: 978-3-319-93554-6
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)