An Identity-Based Authentication Protocol for Clustered ZigBee Network

被引:0
|
作者
Chen, Wei [1 ]
Zhang, Xiaoshuan [1 ]
Tian, Dong [1 ]
Fu, Zetian [1 ]
机构
[1] China Agr Univ, Coll Informat & Elect Engn, Beijing 100083, Peoples R China
关键词
ZigBee network; Security; Identity-based Cryptography; Certificate-Based Cryptography;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
ZigBee technology is designed to be used on applications that require low data rate, low-cost, low power consumption. However, the ZigBee networks are vulnerable to various attacks. In this paper, we have proposed an Identity-based authentication protocol for a ZigBee network structured to have multiple clusters consisting of one coordinator and many devices. Further more, we have designed a secure protocol used for exchanging public parameters between two clusters. Our proposal could realize secure, fast, low-cost and scalable authentication between any two nodes in a clustered ZigBee network.
引用
收藏
页码:503 / 510
页数:8
相关论文
共 50 条
  • [21] Identity-based authentication key agreement protocol for horizontal federated learning environment
    Ren J.
    Li M.
    Du Y.
    Yin L.
    Beijing Hangkong Hangtian Daxue Xuebao/Journal of Beijing University of Aeronautics and Astronautics, 2023, 49 (02): : 397 - 405
  • [22] Research on Identity-Based Batch Anonymous Authentication Scheme for Vehicular Network
    Song C.
    Gu X.-A.
    Wang L.
    Liu Z.-Z.
    Yan X.-X.
    Beijing Youdian Daxue Xuebao/Journal of Beijing University of Posts and Telecommunications, 2019, 42 (05): : 69 - 74
  • [23] A Two-Party Identity-Based Key Agreement Protocol with Explicit Authentication
    Yang, Haomin
    Zhang, Yaoxue
    Zhou, Yuezhi
    2012 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING (WICOM), 2012,
  • [24] Mobile IP and WLAN with AAA authentication protocol using identity-based cryptography
    Lee, BG
    Choi, DH
    Kim, HG
    Sohn, SW
    Park, KH
    ICT'2003: 10TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS, VOLS I AND II, CONFERENCE PROCEEDINGS, 2003, : 597 - 603
  • [25] A Cross-Domain Authentication Protocol by Identity-Based Cryptography on Consortium Blockchain
    Wei S.-J.
    Li S.-S.
    Wang J.-H.
    Jisuanji Xuebao/Chinese Journal of Computers, 2021, 44 (05): : 908 - 920
  • [26] ZigBee security using identity-based cryptography
    Nguyen, Son Thanh
    Rong, Chunming
    AUTONOMIC AND TRUSTED COMPUTING, PROCEEDINGS, 2007, 4610 : 3 - +
  • [27] A One-Pass Identity-Based Authentication and Key Agreement Protocol for Wireless Roaming
    Bao, Qingrui
    Hou, Mengbo
    Choo, Kim-Kwang Raymond
    2016 SIXTH INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND TECHNOLOGY (ICIST), 2016, : 443 - 447
  • [28] Smart Home Security: A Distributed Identity-based Security Protocol for Authentication and Key Exchange
    Rathore, M. Mazhar
    Bentafat, Elmahdi
    Bakiras, Spiridon
    2019 28TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND NETWORKS (ICCCN), 2019,
  • [29] Mutual Authentication Protocol Using Identity-Based Shared Secret Key in Cloud Environments
    Saxena, Sandeep
    Sanyal, Goutam
    Srivastava, Shashank
    2014 RECENT ADVANCES AND INNOVATIONS IN ENGINEERING (ICRAIE), 2014,
  • [30] An Identity-Based Authentication Model for Mobile Agent
    Yu, Yike
    Zheng, Xuefeng
    Zhang, Mingde
    Zhang, Qingguo
    FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 475 - 478