Abstract
The security of wireless sensor networks is very important. In order to research the security of wireless sensor networks based on the ZigBee standard, this paper firstly introduces the stack architecture of the ZigBee protocol, security suites, stating the codes of encryption and data integrity authentication algorithm. Then, it analyzes the security defects on wireless sensor networks- e. g., channel interference, address assignment conflict and route found flooding in the networking; and key-tapping, defects in the encryption without integrity protection and no identity certification in the security services. Finally, it offers some coping methods: setting standby channel setting, improving routing algorithm, using asymmetric authentication and key exchange based on elliptic curve cryptography, etc.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.