Citation: | SHANG Tao, HUANG Fuhua, CHEN Jie, LIU Jianwei. A Security-enhanced Key Distribution Scheme for AODVjr Routing Protocol in ZigBee Networks[J]. Chinese Journal of Electronics, 2013, 22(3): 577-582. |
ZigBee Alliance, ZigBee Specification (R17), 2008.
|
N. Sastry, D. Wagner, “Security considerations for IEEE 802.15.4 networks”, Proceedings of the 3rd ACM workshop on Wireless security, Philadelphia, PA, USA, pp.32-42, 2004.
|
J. Zheng, M.J. Lee, M. Anshel, “Toward Secure Low Rate Wireless Personal Area Networks”, IEEE Transactions on Mobile Computing, Vol.5, No.10, pp.1361-1373, 2006.
|
Hyunjue Kim, Chang Hyun Kim, Jong Moon Chung, “A novel elliptical curve ID cryptography protocol for multi-hop ZigBee sensor networks”, Wireless Communications and Mobile Computing, Vol.12, No.2, pp.145-157, 2012.
|
Hyunjue Kim, JongChung, Chang Hyun Kim, “Secured communication protocol for internetworking zigbee cluster networks”, Computer Communications, Vol.32, pp.1531-1540, 2009.
|
Wei Chen, XiaoShuan Zhang, Dong Tian, Zetian Fu, “An identity-based authentication protocol for clustered ZigBee network”, Proceedings of the Advanced Intelligent Computing Theories and Applications, and 6th International Conference on Intelligent Computing, pp.503-510, 2010.
|
Peng Ran, Mao-heng Sun, You-min Zou, “ZigBee routing selection strategy based on data services and energy-balanced ZigBee routing”, Proceedings of the 2006 IEEE Asia-Pacific Conference on Services Computing (APSCC'06), Guang zhou, China, pp.400-404, 2006.
|
Francesca Cuomo, Sara Della Luna, Ugo Monaco, Tommaso Melodia, “Routing in ZigBee: benefits from exploiting the IEEE 802.15.4 association tree”, Proceedings of IEEE International Conference on Communications 2007, Glasgow, Scotland, pp.3271-3276, 2007.
|
F. Qiu, J.M. Wang, J. Leng, “Design and implementation of a wireless personal area network based on AODVjr routing”, Proceedings of Wireless Mobile & Multimedia Networks, Beijing: The Institution of Engineering and Technology, London (IET), pp.424-427, 2006.
|
Ian D. Chakeres, Luke Klein-Verndt, “AODVjr, AODV Simplified”, Mobile Computing and Communication Review, Vol.6, No.3, pp.100-101, 2002.
|
Tao Shang, Wei Wu, Xudong Liu, Jianwei Liu, “AODVjr routing protocol with multiple feedback policy for ZigBee network”, The 13th IEEE International Symposium on Consumer Electronics, Kyoto, Japan, pp.483-487, 2009.
|
Manel Guerrero Zapata, “Secure Ad hoc on-demand distance vector routing”, Mobile Computing and Communications Review,Vol.6, No.3, pp.106-107, 2002.
|
Tao Shang, Jianwei Liu, “Security Enhancement of AODVjr Routing Protocol for ZigBee Network”, The Fifth International Conference on Communications and Networking, Beijing, China, August 25-27, 2010.
|
[1] | CUI Shuo, LI Yaoyao, ZHANG Shijian, CHEN Ling, CAO Cheng, SU Donglin. A Polarization Control Operator for Polarized Electromagnetic Wave Designing[J]. Chinese Journal of Electronics, 2024, 33(5): 1253-1260. DOI: 10.23919/cje.2022.00.410 |
[2] | PENG Jiayin, LEI Hongxuan. Cyclic Remote Implementation of Partially Unknown Quantum Operations[J]. Chinese Journal of Electronics, 2021, 30(2): 378-383. DOI: 10.1049/cje.2021.02.010 |
[3] | LIU Shangdong, WU Ye, JI Yimu, CHEN Chen, BI Qiang, JIAO Zhipeng, GONG Jian, WANG Ruchuan. Research on Security of Key Algorithms in Intelligent Driving System[J]. Chinese Journal of Electronics, 2019, 28(1): 29-38. DOI: 10.1049/cje.2018.11.003 |
[4] | LIU Dong, CHEN Jing, DU Ruiying, ZHANG Huanguo. Enhancing Security of the Reduced-Operation Two-Factor Authentication by Using Ambient WiFi[J]. Chinese Journal of Electronics, 2018, 27(3): 625-633. DOI: 10.1049/cje.2018.03.004 |
[5] | SHI Weiwei, PENG Panfeng, CHOY Chiu-Sing. A 90nm Passive RFID Tag's Custom Baseband Processor for Subthreshold Operation Below 0.3V[J]. Chinese Journal of Electronics, 2017, 26(4): 720-724. DOI: 10.1049/cje.2017.04.006 |
[6] | SHU Dasong, HUANG Zhixiong, LI Junye, ZOU Xiaoyang. Application of Multi-agent Particle Swarm Algorithm in Distribution Network Reconfiguration[J]. Chinese Journal of Electronics, 2016, 25(6): 1179-1185. DOI: 10.1049/cje.2016.10.015 |
[7] | TAO Dan, YANG Guangwei, CHEN Houjin, WU Hao, LIU Pingping. Efficient Image Transmission Schemes over Zigbee-Based Image Sensor Networks[J]. Chinese Journal of Electronics, 2016, 25(2): 284-289. DOI: 10.1049/cje.2016.03.014 |
[8] | WANG Xiang, PEI Qingqi, YAN Peimin, LI Hui, WANG Yong. A Novel Visual Multi-Secret Sharing Scheme Based on Folding-up Operation[J]. Chinese Journal of Electronics, 2013, 22(4): 795-798. |
[9] | LIANG Xiao, YUE Lihua, XIONG Yan, CHENG Wenjuan, LIU Shichen. On the Analysis of Evolutionary Programming with Self-adaptive Cauchy Operation[J]. Chinese Journal of Electronics, 2012, 21(2): 309-312. |
[10] | LIANG Hongliang, LI Shoupeng, DONG Shouji, YUAN Chunyang, NIU Shaozhang. Design and Implementation of EARTH Operating System[J]. Chinese Journal of Electronics, 2012, 21(1): 33-36. |