Wenjie Li
Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology, Tianjin University of Technology, China
Qianqian Cao
Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology, Tianjin University of Technology, China
Zhuzi Liu
Key Laboratory of Computer Vision and System, Ministry of Education, Tianjin University of Technology, China
ABSTRACT
Zigbee provides a connection to a variety of wireless devices and solves the problem of the communicating between different protocols. ZigBee can provide wireless communication which is low rate, low complexity, short distance and low cost. Due to the existence of various attacks in the wireless transmission, security becomes a bottleneck for Zigbee applications. In the study, we designed the model based on dynamic key which is sent in Zigbee network and analyzed its performances.
PDF References Citation
How to cite this article
Wenjie Li, Qianqian Cao and Zhuzi Liu, 2013. Improvement of Key in ZigBee Wireless Network. Information Technology Journal, 12: 4593-4596.
DOI: 10.3923/itj.2013.4593.4596
URL: https://scialert.net/abstract/?doi=itj.2013.4593.4596
DOI: 10.3923/itj.2013.4593.4596
URL: https://scialert.net/abstract/?doi=itj.2013.4593.4596
REFERENCES
- Akyildiz, I.F., W. Su, Y. Sankarasubramaniam and E. Cayirci, 2002. Wireless sensor networks: A survey. Comput. Networks, 38: 393-422.
CrossRefDirect Link - Anderson, R., H.W. Chan and A. Perrig, 2004. Key infection: Smart trust for smart dust. Proceedings of the 12th IEEE International Conference Network Protocols, October 5-8, 2004, Berlin, Germany, pp: 206-215.
CrossRef - Chan, H., A. Perrig and D. Song, 2003. Random key predistribution schemes for sensor networks. Proceedings of the IEEE Symposium on Security and Privacy, May 11-14, 2003, Berkeley, CA., USA., pp: 197-213.
CrossRef - Eschenauer, L. and V. D. Gligor, 2002. A key-management scheme for distributed sensor networks. Proceedings of the ACM Conference on Computer and Communications Security, November 18-22, 2002, Washington, DC., USA., pp: 41-47.
CrossRef - Li, W.J., S. Liu and Y. Hu, 2013. Research on XML-based exchanging system between databases. Adv. Mater. Res., 651: 789-794.
Direct Link - Perrig A., R. Szewczyk, J.D. Tygar, V. Wen and D.E. Culler, 2002. SPINS: Security protocols for sensor networks. Wireless Networks, 8: 521-534.
CrossRefDirect Link