ZigBee/ZigBee PRO Security Assessment Based on Compromised Cryptographic Keys.
Pedram RadmandMarc Domingo-PrietoJaipal SinghJoan Arnedo-MorenoAlex TalevskiStig PetersenSimon CarlsenPublished in: 3PGCIC (2010)
Keyphrases
- energy consumption
- wireless sensor networks
- energy efficient
- key management
- key establishment
- wireless sensor
- sensor networks
- resource constrained
- wireless communication
- sensor nodes
- security properties
- monitoring system
- encryption scheme
- smart card
- key management scheme
- security protocols
- intrusion detection
- hash functions
- security policies
- cryptographic protocols
- security mechanisms
- secret key
- security services
- security requirements
- low rate
- random number generator
- information security
- low power consumption
- stream cipher
- authentication scheme
- low cost
- digital signature
- elliptic curve
- wifi
- security issues
- risk assessment
- data acquisition
- smart home
- network security
- power consumption