Security Improve in ZigBee Protocol Based on RSA Public Algorithm in WSN | ||
Engineering and Technology Journal | ||
Article 1, Volume 37, 3B, December 2019, Pages 67-73 PDF (914.84 K) | ||
Document Type: Research Paper | ||
DOI: 10.30684/etj.37.3B.1 | ||
Authors | ||
Nabaa A. Hasan; Alaa K. Farhan | ||
Computer Science Department, University of Technology - Iraq | ||
Abstract | ||
ZigBee is consuming low energy and providing the protection in Wireless Sensor Networks. ZigBee pro is supporting most applications. In spite of improved the security, ZigBee pro weak in key administration. In this paper, we depend on Logistic Map Diffie Hellman (LMDH) and SubMAC for Wireless Sensor Networks by ZigBee. In addition, we will improve the security in ZigBee by using the Rivest-ShamirAdleman (RSA) algorithm instead of Advanced Encryption Standard (AES). LMDH used for improved key administration schema (protect key distribution) and SubMAC used for providing authentication and prevented Man-In-The-Middle (MITM) and Replay attacks, LMHD did not provide this service, so we use SubMAC to overcome with this problem, and use RSA to improve the security by encrypting the network key and ensure that the connection is secure between the nodes and then we can send the data safely. And the results ensure: the proposed is extra effective when compare with ZigBee pro from where the execution time and power consumption, in addition, it proved that security is improving. | ||
Keywords | ||
key management; logistic map; LMDH; MITM; Wireless Sensor Network; ZigBee Pro | ||
References | ||
[1] T. Alhmiedat, “Low-power Environmental Monitoring System for ZigBee Wireless Sensor Network”, VOL. 11, NO. 10, Oct. 2017. [2] ZigBee Alliance, “ZigBee-2007 Specification,” San Ramon, CA 94583January 2008. [3] N. Challa, H. Cam, and M. Sikri, “Secure and Efficient Data Transmission over Body Sensor and Wireless Networks,” EURASIP Journal on Wireless Communications and Networking, VOL 2008, Article ID 291365, 18 pages, February 2008. [4] S.M. Soliman, B. Magdy and M.A. Abd El Ghany, “Efficient Implementation of the AES Algorithm for Security Applications,” IEEE, 2016. [5] C. Alcaraz, and J. Lopez, “A Security Analysis for Wireless Sensor Mesh Networks in highly Critical Systems,” IEEE. Transactions on Systems, MAN, and Cybernetics, Part C: Applications and Reviews, Vol. 40, No. 4, July 2010. [6] K. Choi, M. Yun, and K. Chae and M. Kim, “An Enhanced Key Management Using ZigBee Pro for Wireless Sensor Networks,” IEEE, 2012. [7] N. Koblitz, “Elliptic curve cryptosystems,” Mathematics of Computation, Vol. 48, No. 177, January 1987. [8] Q. He, Q. Qi, Y. Zhao, W. Huang, and Q. Huang, “The Application of Chaotic Encryption in Industrial Control Based on ZigBee Wireless Network,” IEEE, 2008. [9] V.C. Preduna, F.M. Jimenez and A.P. Manguillot, “The logistic map of matrices,” Universitat Politecnica de Valencia, September 13, 2012. [10] W. Diffie, and M. E. Hellman, “New Direction in Cryptography,” IEEE Transactions on Information Theory, 1976. [11] W. Jirakitpuwapat and P. Kumam, “The Generalized Diffie-Hellman Key Exchange Protocol on Groups,” Springer International Publishing AG 2018. [12] M. Ahmed, B. Sanjabi, D. Aldiaz, A. Rezaei, and H. Omotunde, “Diffie-Hellman and Its Application in Security Protocols,” Certified International Journal of Engineering Science and Innovative Technology (IJESIT) Volume 1, Issue 2, November 2012. [13] G. Singh and Supriya “A Study of Encryption Algorithms (RSA, DES, 3DES and AES) for Information Security,” International Journal of Computer Applications (0975 – 8887) VOL 67, No.19, April 2013. [14] U. Somani, K. Lakhani and M. Mundra, “Implementing Digital Signatures with RSA Encryption Algorithm to Enhance the Data Security of Cloud in Cloud Computing,” 1st International Conference on Parallel, Distributed and Grid Computing (PDGC), Solan, India, pp. 211-216, 2010. [15] A.J. Menezes, P.C. Van Oorschot, and S.A. Vanstone, “Handbook of applied cryptography,” 1996. [16] A.K. Farhan, N.A. Hasan, “Improved key management using ZigBee Pro and logistic map for wireless sensor networks,” 3st International Scientific Conference on Integration between government institutions and private sector institutions - constraints and prospects for success, Baghdad, Iraq, 2019. [17] K. Choi, M.-H. Kim, K.-J. Chae, J.-J. Park, and S.-S. Joo, “An Efficient Data Fusion and Assurance Mechanism using Temporal and Spatial Correlations for Home Automation Networks,” IEEE Transactions on Consumer Electronics, VOL. 55, No. 3, August 2009. | ||
Statistics Article View: 460 PDF Download: 374 |