Sensor Networking through Intranet and ZigBee
The result's identifiers
Result code in IS VaVaI
<a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F00216305%3A26230%2F07%3APU73398" target="_blank" >RIV/00216305:26230/07:PU73398 - isvavai.cz</a>
Result on the web
—
DOI - Digital Object Identifier
—
Alternative languages
Result language
angličtina
Original language name
Sensor Networking through Intranet and ZigBee
Original language description
This paper describes a relatively new technology of ZigBee architecture and represents approach to safety and security in sensors networks, namely in ZigBee networks. This contribution describes the security level of sensors network which consists on safe keeping symmetric keys, on the protection of the inbuilt mechanisms and on the proper implementation of encryption mechanisms and their appropriate security policies. The upcoming security encryption services protectes interfaces between various devices, without dividing into levels like in ZigBee stack. This is based on open trust model which allows reusing the same encryption/description keys for communication among simple layers in the stack. It provides safety between two end devices instead of security among end-levels within the frame of one's device. It means that active network key will be used for security broadcast frames on application layer, frame on network layer or orders on MAC layer.
Czech name
Sensor Networking through Intranet and ZigBee
Czech description
This paper describes a relatively new technology of ZigBee architecture and represents approach to safety and security in sensors networks, namely in ZigBee networks. This contribution describes the security level of sensors network which consists on safe keeping symmetric keys, on the protection of the inbuilt mechanisms and on the proper implementation of encryption mechanisms and their appropriate security policies. The upcoming security encryption services protectes interfaces between various devices, without dividing into levels like in ZigBee stack. This is based on open trust model which allows reusing the same encryption/description keys for communication among simple layers in the stack. It provides safety between two end devices instead of security among end-levels within the frame of one's device. It means that active network key will be used for security broadcast frames on application layer, frame on network layer or orders on MAC layer.
Classification
Type
D - Article in proceedings
CEP classification
JC - Computer hardware and software
OECD FORD branch
—
Result continuities
Project
Result was created during the realization of more than one project. More information in the Projects tab.
Continuities
P - Projekt vyzkumu a vyvoje financovany z verejnych zdroju (s odkazem do CEP)
Others
Publication year
2007
Confidentiality
S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů
Data specific for result type
Article name in the collection
EDS '07 IMAPS CS International Conference Proceedings
ISBN
978-80-214-3470-7
ISSN
—
e-ISSN
—
Number of pages
5
Pages from-to
1-5
Publisher name
Brno University of Technology
Place of publication
Brno
Event location
Brno
Event date
Sep 20, 2007
Type of event by nationality
EUR - Evropská akce
UT code for WoS article
—