Security algorithm of Internet of Things based on ZigBee protocol

被引:16
作者
Wang, Yongkang [1 ]
Chen, Chunxia [2 ]
Jiang, Qijie [3 ]
机构
[1] Civil Aviat Flight Univ China, Sch Aviat Transportat Management, Guanghan, Peoples R China
[2] Chengdu Technol Univ, Sch Econ & Management, Chengdu, Sichuan, Peoples R China
[3] Univ Nottingham, Sch Business, Nottingham, England
来源
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS | 2019年 / 22卷 / Suppl 6期
基金
中国国家自然科学基金;
关键词
ZigBee protocol; Security; AES-128; Algorithm optimization;
D O I
10.1007/s10586-018-2388-4
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
To study the application of ZigBee protocol in the security algorithm of Internet of Things, the relevant development status at home and abroad is firstly summarized and ZigBee technology is introduced in detail. Then, the principle of AES-128 algorithm is analyzed, and the steps of decryption algorithm are adjusted, so that the decryption algorithm is symmetric in structure and encryption algorithm. In addition, the encryption and decryption algorithm of AES-128 is implemented by using C language. Based on the characteristics of simplicity and low cost of ZigBee technology, the two optimization algorithms are designed and implemented from the analysis of simplicity and efficiency based on the performances of security algorithm. The analysis and test results show that the two optimization algorithms are better than the UN optimized algorithm in terms of speed and complexity. To sum up, in the result comparison, it is found that the speed and complexity of the round operation optimization algorithm is better than that of the column obfuscation optimization algorithm.
引用
收藏
页码:14759 / 14766
页数:8
相关论文
共 12 条
  • [1] Eliminating Reconciliation Cost in Secret Key Generation for Body-Worn Health Monitoring Devices
    Ali, Syed Taha
    Sivaraman, Vijay
    Ostry, Diethelm
    [J]. IEEE TRANSACTIONS ON MOBILE COMPUTING, 2014, 13 (12) : 2763 - 2776
  • [2] Optimizing groups of colluding strong attackers in mobile urban communication networks with evolutionary algorithms
    Bucur, Doina
    Iacca, Giovanni
    Gaudesi, Marco
    Squillero, Giovanni
    Tonda, Alberto
    [J]. APPLIED SOFT COMPUTING, 2016, 40 : 416 - 426
  • [3] A BSP algorithm for on-the-fly checking CTL* formulas on security protocols
    Gava, Frederic
    Pommereau, Franck
    Guedj, Michael
    [J]. JOURNAL OF SUPERCOMPUTING, 2014, 69 (02) : 629 - 672
  • [4] Gelogo YE, 2014, ASIA LIFE SCI, P17
  • [5] IJAZ S, 2017, APPL INTELL, V9, P1
  • [6] MINGXIN W, 2013, SENS TRANSDUCERS, V160, P570
  • [7] Neighbour discovery in opportunistic networks
    Orlinski, M.
    Filer, N.
    [J]. AD HOC NETWORKS, 2015, 25 : 383 - 392
  • [8] Scalable RFID security framework and protocol supporting Internet of Things
    Ray, Biplob R.
    Abawajy, Jemal
    Chowdhury, Morshed
    [J]. COMPUTER NETWORKS, 2014, 67 : 89 - 103
  • [9] SAIED YB, 2014, COMPUT NETW, V64, P273, DOI DOI 10.1016/j.comnet.2014.02.001
  • [10] Wu CH, 2011, IEEE IND ELEC, P3808