SHANG Tao, HUANG Fuhua, CHEN Jie, LIU Jianwei. A Security-enhanced Key Distribution Scheme for AODVjr Routing Protocol in ZigBee Networks[J]. Chinese Journal of Electronics, 2013, 22(3): 577-582.
Citation: SHANG Tao, HUANG Fuhua, CHEN Jie, LIU Jianwei. A Security-enhanced Key Distribution Scheme for AODVjr Routing Protocol in ZigBee Networks[J]. Chinese Journal of Electronics, 2013, 22(3): 577-582.

A Security-enhanced Key Distribution Scheme for AODVjr Routing Protocol in ZigBee Networks

Funds: This work is supported by the Fundamental Research Funds for Central Universities (No.YWF1103Q009), the National Natural Science Foundation of China (No.61272501), and the National Key Basic Research Program of China (No.2012CB315905).
More Information
  • Received Date: September 30, 2011
  • Revised Date: May 31, 2012
  • Published Date: June 14, 2013
  • ZigBee network is a kind of flexible wireless network technology for control and monitoring applications and new techniques of security measures are essential for high-survivability network. Based on the effectiveness of AODVjr (Ad hoc on-demand distance vector junior) routing protocol in ZigBee networks, in this paper, we proposed a new security-enhanced key distribution scheme for AODVjr routing protocol in ZigBee networks. The key distribution was scheme implemented by combining the parameter exchange of Diffie-Hellman algorithm into the handshake protocol for node's joining a ZigBee network. Especially, the major improvement of Diffie-Hellman algorithm is to mix the parameters of key exchange with XOR operation so as to defend against typical man-in-the-middle attacks. Meanwhile, we analyzed the effect of XOR operation on key parameters by deducing the related theorems. Through the security analysis, the key distribution scheme demonstrates stronger security. We can verify that the AODVjr routing protocol with security enhancement has larger flexible application in ZigBee networks.
  • ZigBee Alliance, ZigBee Specification (R17), 2008.
    N. Sastry, D. Wagner, “Security considerations for IEEE 802.15.4 networks”, Proceedings of the 3rd ACM workshop on Wireless security, Philadelphia, PA, USA, pp.32-42, 2004.
    J. Zheng, M.J. Lee, M. Anshel, “Toward Secure Low Rate Wireless Personal Area Networks”, IEEE Transactions on Mobile Computing, Vol.5, No.10, pp.1361-1373, 2006.
    Hyunjue Kim, Chang Hyun Kim, Jong Moon Chung, “A novel elliptical curve ID cryptography protocol for multi-hop ZigBee sensor networks”, Wireless Communications and Mobile Computing, Vol.12, No.2, pp.145-157, 2012.
    Hyunjue Kim, JongChung, Chang Hyun Kim, “Secured communication protocol for internetworking zigbee cluster networks”, Computer Communications, Vol.32, pp.1531-1540, 2009.
    Wei Chen, XiaoShuan Zhang, Dong Tian, Zetian Fu, “An identity-based authentication protocol for clustered ZigBee network”, Proceedings of the Advanced Intelligent Computing Theories and Applications, and 6th International Conference on Intelligent Computing, pp.503-510, 2010.
    Peng Ran, Mao-heng Sun, You-min Zou, “ZigBee routing selection strategy based on data services and energy-balanced ZigBee routing”, Proceedings of the 2006 IEEE Asia-Pacific Conference on Services Computing (APSCC'06), Guang zhou, China, pp.400-404, 2006.
    Francesca Cuomo, Sara Della Luna, Ugo Monaco, Tommaso Melodia, “Routing in ZigBee: benefits from exploiting the IEEE 802.15.4 association tree”, Proceedings of IEEE International Conference on Communications 2007, Glasgow, Scotland, pp.3271-3276, 2007.
    F. Qiu, J.M. Wang, J. Leng, “Design and implementation of a wireless personal area network based on AODVjr routing”, Proceedings of Wireless Mobile & Multimedia Networks, Beijing: The Institution of Engineering and Technology, London (IET), pp.424-427, 2006.
    Ian D. Chakeres, Luke Klein-Verndt, “AODVjr, AODV Simplified”, Mobile Computing and Communication Review, Vol.6, No.3, pp.100-101, 2002.
    Tao Shang, Wei Wu, Xudong Liu, Jianwei Liu, “AODVjr routing protocol with multiple feedback policy for ZigBee network”, The 13th IEEE International Symposium on Consumer Electronics, Kyoto, Japan, pp.483-487, 2009.
    Manel Guerrero Zapata, “Secure Ad hoc on-demand distance vector routing”, Mobile Computing and Communications Review,Vol.6, No.3, pp.106-107, 2002.
    Tao Shang, Jianwei Liu, “Security Enhancement of AODVjr Routing Protocol for ZigBee Network”, The Fifth International Conference on Communications and Networking, Beijing, China, August 25-27, 2010.
  • Related Articles

    [1]CUI Shuo, LI Yaoyao, ZHANG Shijian, CHEN Ling, CAO Cheng, SU Donglin. A Polarization Control Operator for Polarized Electromagnetic Wave Designing[J]. Chinese Journal of Electronics, 2024, 33(5): 1253-1260. DOI: 10.23919/cje.2022.00.410
    [2]PENG Jiayin, LEI Hongxuan. Cyclic Remote Implementation of Partially Unknown Quantum Operations[J]. Chinese Journal of Electronics, 2021, 30(2): 378-383. DOI: 10.1049/cje.2021.02.010
    [3]LIU Shangdong, WU Ye, JI Yimu, CHEN Chen, BI Qiang, JIAO Zhipeng, GONG Jian, WANG Ruchuan. Research on Security of Key Algorithms in Intelligent Driving System[J]. Chinese Journal of Electronics, 2019, 28(1): 29-38. DOI: 10.1049/cje.2018.11.003
    [4]LIU Dong, CHEN Jing, DU Ruiying, ZHANG Huanguo. Enhancing Security of the Reduced-Operation Two-Factor Authentication by Using Ambient WiFi[J]. Chinese Journal of Electronics, 2018, 27(3): 625-633. DOI: 10.1049/cje.2018.03.004
    [5]SHI Weiwei, PENG Panfeng, CHOY Chiu-Sing. A 90nm Passive RFID Tag's Custom Baseband Processor for Subthreshold Operation Below 0.3V[J]. Chinese Journal of Electronics, 2017, 26(4): 720-724. DOI: 10.1049/cje.2017.04.006
    [6]SHU Dasong, HUANG Zhixiong, LI Junye, ZOU Xiaoyang. Application of Multi-agent Particle Swarm Algorithm in Distribution Network Reconfiguration[J]. Chinese Journal of Electronics, 2016, 25(6): 1179-1185. DOI: 10.1049/cje.2016.10.015
    [7]TAO Dan, YANG Guangwei, CHEN Houjin, WU Hao, LIU Pingping. Efficient Image Transmission Schemes over Zigbee-Based Image Sensor Networks[J]. Chinese Journal of Electronics, 2016, 25(2): 284-289. DOI: 10.1049/cje.2016.03.014
    [8]WANG Xiang, PEI Qingqi, YAN Peimin, LI Hui, WANG Yong. A Novel Visual Multi-Secret Sharing Scheme Based on Folding-up Operation[J]. Chinese Journal of Electronics, 2013, 22(4): 795-798.
    [9]LIANG Xiao, YUE Lihua, XIONG Yan, CHENG Wenjuan, LIU Shichen. On the Analysis of Evolutionary Programming with Self-adaptive Cauchy Operation[J]. Chinese Journal of Electronics, 2012, 21(2): 309-312.
    [10]LIANG Hongliang, LI Shoupeng, DONG Shouji, YUAN Chunyang, NIU Shaozhang. Design and Implementation of EARTH Operating System[J]. Chinese Journal of Electronics, 2012, 21(1): 33-36.

Catalog

    Article Metrics

    Article views (639) PDF downloads (1332) Cited by()
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return