1-4hit |
Security plays an important role in several ZigBee applications such as Smart Energy and medical sensor applications. For a secure communication among ZigBee devices, a secret key should be shared among any two ZigBee devices using the Key Distribution protocol. Recently, Yüksel and Nielson proposed a new Key Distribution protocol for ZigBee addressing the security weaknesses of the original ZigBee Key Distribution protocol. In this letter, it is shown that their protocol is not secure against a key de-synchronization attack, and a security-enhanced Key Distribution protocol is newly proposed and analyzed in terms of security.
Motivated by the fact that the existing FMIPv6 security scheme has several weaknesses in terms of security and efficiency, we propose a security-enhanced fast mobile IPv6 in this letter. Based on the concept of a secret key-based CGA (Cryptographically Generated Address), we show how to establish a new security association between the MN and AR (Access Router) whenever a handover occurs. We also show that the proposed scheme is robust against several types of security attacks feasible with the existing scheme. Our scheme is more efficient in that it requires fewer public key operations.
We introduce a new hierarchical key management scheme which can be applied for secure Mobile IP registration protocol. Contrary to the previous schemes, AAA protocol used for registration key distribution is separated from the base registration protocol, so that the registration key distribution can be simplified and the delay caused by the AAA protocol can be avoided. Also proposed is the non-repudiation service based on a hash chain, which is useful for secure auditing.
A receiver access control scheme is proposed to protect the multicast distribution tree from DoS attack induced by unauthorized use of IGMP, by extending the security-related functionality of IGMP. Based on a specific network and business model adopted for commercial deployment of IP multicast applications, a key management scheme is also presented for bootstrapping the proposed access control as well as accounting and billing for CP (Content Provider), NSP (Network Service Provider), and group members.