Analysing ZigBee Key Establishment Protocols

نویسنده

  • Ender Yüksel
چکیده

Preface This report provides a detailed documentation on the application of static program analysis to the key establishment protocols of the ZigBee wireless sensor network standard. The approach presented in this report is within the scope of the SENSORIA (Software Engineering for Service-Oriented Overlay Computers) project, and will form a preliminary version of one of the chapters in my PhD dissertation. The discovered flaw and the proposed secure protocols were recently published in a conference paper (see references [17]) and also accepted for journal publication. I would like to thank Hanne Riis Nielson and Flemming Nielson for the supervision and invaluable contribution in this work, and also for providing me with this opportunity to work on an international research project. I would also like to thank Gavin Lowe for kind discussions and feedback on fixing the flaw in the key establishment protocol.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Coloured Petri Net Methodology and Library for Security Analysis of Network Protocols

Formal methods are often used to prove properties of network protocols, including required security properties. However for a protocol modeller the techniques available for security analysis often require expert knowledge of the technique. Also the tight coupling of protocol model and security attacks limit re-use of models. With Coloured Petri nets as the selected formal method, this paper pro...

متن کامل

Verifying Security Properties in Unbounded Multiagent Systems

We study the problem of analysing the security for an unbounded number of concurrent sessions of a cryptographic protocol. Our formal model accounts for an arbitrary number of agents involved in a protocol-exchange which is subverted by a Dolev-Yao attacker. We define the parameterised model checking problem with respect to security requirements expressed in temporal-epistemic logics. We formul...

متن کامل

Research and Design of Meter Reading System Based on ZigBee Wireless Sensor Network

With the rapid development of wireless technologies, it is possible for Chinese automatic meter reading system (AMRS) to be equipped with wireless sensor networks due to their low-cost, simplicity and mobility. In the current study, we compared the advantages of ZigBee with other two similar wireless networking protocols, Wi-Fi and Bluetooth, and proposed a wireless solution for AMRS based on Z...

متن کامل

Data Security in Wireless Sensor Networks – the Task for Public Key Cryptography

The paper describes security algorithms and protocols provided by recent WSN stacks where symmetric-key schemes are commonly used. Using these schemes seems to be impractical in large scale networks; hence the paper intends their replacement by public-key schemes for mentioned low cost and low power MCU platforms. Moreover, the paper proposes implementation of Wireless Sensor Network (WSN) stac...

متن کامل

Non-associative key establishment protocols and their implementation

We provide implementation details for non-associative key establishment protocols. In particular, we describe the implementation of non-associative key establishment protocols for all left self-distributive and all mutually left distributive systems.

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • CoRR

دوره abs/1205.6678  شماره 

صفحات  -

تاریخ انتشار 2012