New Security Approach for ZigBee Weaknesses

@inproceedings{Razouk2014NewSA,
  title={New Security Approach for ZigBee Weaknesses},
  author={Wissam Razouk and Garth V. Crosby and Abderrahim Sekkaki},
  booktitle={EUSPN/ICTH},
  year={2014}
}
The latest version of ZigBee offers improvements over many aspects like low power consumption, flexibility and inexpensive deployment. However problems persist, as the enhanced protocol still has many security weaknesses due to the fact that constrained wireless sensor network devises cannot uses standard security protocols such as public key cryptography mechanisms. In this paper, we highlight relevant security concerns related to ZigBee security features, then we propose a new approach… CONTINUE READING

From This Paper

Figures, tables, and topics from this paper.
2 Citations
6 References
Similar Papers

References

Publications referenced by this paper.
Showing 1-6 of 6 references

Extracting keys from second generation zigbee chips

  • Travis Goodspeed
  • Black Hat USA,
  • 2009

Zigbee-2007 security essentials

  • Ender Yüksel, Hanne Riis Nielson, Flemming Nielson
  • In Proc. 13th Nordic Workshop on Secure IT…
  • 2008

198, the keyed-hash message authentication code (hmac)

  • FIPS Pub
  • Federal Information Processing Standards…
  • 2002

Similar Papers

Loading similar papers…