AES and ECC Mixed for ZigBee Wireless Sensor Security

In this paper, we argue the security protocols of ZigBee wireless sensor network in MAC layer. AES 128-bit encryption algorithm in CCM* mode is secure transferred data; however, AES-s secret key will be break within nearest future. Efficient public key algorithm, ECC has been mixed with AES to rescue the ZigBee wireless sensor from cipher text and replay attack. Also, the proposed protocol can parallelize the integrity function to increase system performance.




References:
[1] Li Chunqing, Zhang Jiancheng, "Research of ZigBee's data security and
protection", International Forum on Computer Science-Technology and
Applications 2009, IEEE, 2009, pp 298 - 302.
[2] ZigBee Alliance, Retrieved 2011, from
http://www.zigbee.org/Standards/Overview.aspx
[3] ZigBee Alliance , "ZigBee and wireless radio frequency coexistence",
white paper, published by ZigBee Alliance, June 2007, Retrieved 2011,
from
http://www.zigbee.org/imwp/idms/popups/pop_download.asp?contentID
=11745
[4] Patrick Kinney, "ZigBee technology: wireless control that simply
works", Communications design conference, vol 2, 2 October 2003.
retrieved 2011, from
http://www.zigbee.org/en/press_kits/latest/documents/white_papers/wp_
zigbeetechwireless_final.pdf
[5] Bin Yang, " Study on security of wireless sensor network based on
ZigBee standard." International Conference on Computational
Intelligence and Security, IEEE, 2009, pp 426 - 430.
[6] Doug Whiting, Russ Housley and Niels Ferguso, "Counter with CBCMAC
(CCM) AES mode of operation", submitted to NIST, retrieved
2011, from
http://csrc.nist.gov/groups/ST/toolkit/BCM/documents/proposedmodes/c
cm/ccm.pdf
[7] Meng Qianqian and Bao Kejin, "Security analysis for wireless networks
based on ZigBee", IEEE,vol 1, 2009, pp 158 - 160.
[8] Arvinderpal S. Wander, Nils Gura, Hans Eberle, Vipul Gupta, Sheueling
Chang Shantz, "Energy analysis of public-key cryptography for wireless
sensor networks", Third IEEE International conference on Pervasive
Compting and Communications, IEEE Computer Society, 2005, pp 324-
328.
[9] Roy Pereira, "ZigBee and ECC secure wireless networks", August 09
2004, retrieved 2011, from
http://electronicdesign.com/article/embedded-software/zigbee-and-eccsecure-
wireless-networks8369.aspx.
[10] Jerry Krasne, "Using elliptic curve cryptography(ECC) for enhanced
embedded security financial advantages of ECC over RSA or Diffie
Hellman", Embedded Market Forecasters American Technology
International, Inc., November 2004, retrieved 2011, from
http://embeddedforecast.com/EMF-ECC-FINAL1204.pdf
[11] ZigBee Alliance, "The enduring value of symmetric encryption", white
paper, August 2000, retrieved 2011 from
http://www.partnerdata.it/files/WP-Symmetric%20Encryption.pdf.
[12] Zhen-rong Li, Yi-qi Zhuang, Chao Zhang and Gang Jin, "Low-power
and area-optimized VLSI implementation of AES coprocessor for
ZigBee system", The Journal of China Universities of Posts and
Telecommunications (Elsevier), vol 16, Issue 3, June 2009, pp 89-94.
[13] Hyunjue Kim, Chang Hyun Kim and Jong-Moon Chung, "A novel
elliptical curve id cryptography protocol for multi-hop ZigBee sensor
networks", Wireless Communication and Mobile Computing Wirel.
Commun. Mob. Comput. (2010), Wiley Interscience, JohnWiley & Sons,
Ltd, 2010.
[14] Tadiwa Elisha Nyamasvisva, Halabi Hasbullah, "Multi-level security
algorithm for random ZigBee wireless sensor networks", Information
Technology (ITSim), 2010 International Symposium in Kuala Lumpur,
IEEE, vol 2, 2010, pp 612 - 617.
[15] Jelena Misic, Vojislav Misic, "Wireless personal area networks
performance interconnections and security with IEEE 802.15.4., John
Wiley & Sons Ltd, 2008.
[16] NFIPS, "197: Announcing the advanced encryption standard (AES)",
Information Technology Laboratory, National Institute of Standards and
Technology, November 2001.
[17] S.A Vanston, "Next generation security for wireless: elliptic curve
cryptography", Computers and Security, Elsevier, vol 22, no. 5, 2003,pp
412 - 415.