Analysis of the Key Agreement Scheme of ZigBee Standard

Author(s):  
Li Chen ◽  
Bing Zhang
2021 ◽  
Vol 2021 ◽  
pp. 1-14
Author(s):  
Xiangyang Wang ◽  
Chunxiang Gu ◽  
Fushan Wei ◽  
Siqi Lu

As an Internet of things (IoT) technology, the ZigBee has a wide range of applications in home automation, smart energy, commercial building automation, personal, home and hospital care, telecom, and wireless sensor. The ZigBee standard has the advantage of high reliability, which is based on the security of authentication key agreement protocol, namely, the SKKE protocol. In the ZigBee standard, this protocol based on shared symmetric-key is applied on the security protocol level. It is a full symmetric-key key agreement with key confirmation scheme, while the key confirmation mechanism is provided by a message authentication coding mechanism. In this paper, we consider the security of the SKKE protocol. In the random Oracle model, we reduce the security of the SKKE protocol to the collision of the hash function and the HMAC function and the indistinguishability between the output of the random Oracle and a random number. We also give a theoretical proof with the game-based method. To our knowledge, there is no research on the provable security of the ZigBee protocol at this stage, so it is helpful to promote further research of the ZigBee protocol security.


2011 ◽  
Vol 22 (11) ◽  
pp. 2843-2852
Author(s):  
Wen-Hao LIU ◽  
Chun-Xiang XU
Keyword(s):  

2014 ◽  
Vol 36 (10) ◽  
pp. 2156-2167
Author(s):  
Qiang LI ◽  
Deng-Guo FENG ◽  
Li-Wu ZHANG ◽  
Zhi-Gang GAO

Sign in / Sign up

Export Citation Format

Share Document