{"title":"基于IEEE 802.15.4的ZigBee安全体系结构分析","authors":"B. Fan","doi":"10.1109/ISADS.2017.23","DOIUrl":null,"url":null,"abstract":"With the rapid development of the network technology and the wireless communication technology, ZigBee now has an increasing wide application, which is an kind of emerging technology in the field of wireless sensor network. So the security of ZigBee is becoming more and more significant. In this paper, ZigBee security architecture, security services, security model, security components, security keys and the Trust Center, security measures of each layers have been exposited, in addition displayed the steps of security implement of ZigBee.","PeriodicalId":303882,"journal":{"name":"2017 IEEE 13th International Symposium on Autonomous Decentralized System (ISADS)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"15","resultStr":"{\"title\":\"Analysis on the Security Architecture of ZigBee Based on IEEE 802.15.4\",\"authors\":\"B. Fan\",\"doi\":\"10.1109/ISADS.2017.23\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"With the rapid development of the network technology and the wireless communication technology, ZigBee now has an increasing wide application, which is an kind of emerging technology in the field of wireless sensor network. So the security of ZigBee is becoming more and more significant. In this paper, ZigBee security architecture, security services, security model, security components, security keys and the Trust Center, security measures of each layers have been exposited, in addition displayed the steps of security implement of ZigBee.\",\"PeriodicalId\":303882,\"journal\":{\"name\":\"2017 IEEE 13th International Symposium on Autonomous Decentralized System (ISADS)\",\"volume\":\"38 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-03-22\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"15\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 IEEE 13th International Symposium on Autonomous Decentralized System (ISADS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ISADS.2017.23\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 IEEE 13th International Symposium on Autonomous Decentralized System (ISADS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISADS.2017.23","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Analysis on the Security Architecture of ZigBee Based on IEEE 802.15.4
With the rapid development of the network technology and the wireless communication technology, ZigBee now has an increasing wide application, which is an kind of emerging technology in the field of wireless sensor network. So the security of ZigBee is becoming more and more significant. In this paper, ZigBee security architecture, security services, security model, security components, security keys and the Trust Center, security measures of each layers have been exposited, in addition displayed the steps of security implement of ZigBee.