Abstract
To study the application of ZigBee protocol in the security algorithm of Internet of Things, the relevant development status at home and abroad is firstly summarized and ZigBee technology is introduced in detail. Then, the principle of AES-128 algorithm is analyzed, and the steps of decryption algorithm are adjusted, so that the decryption algorithm is symmetric in structure and encryption algorithm. In addition, the encryption and decryption algorithm of AES-128 is implemented by using C language. Based on the characteristics of simplicity and low cost of ZigBee technology, the two optimization algorithms are designed and implemented from the analysis of simplicity and efficiency based on the performances of security algorithm. The analysis and test results show that the two optimization algorithms are better than the UN optimized algorithm in terms of speed and complexity. To sum up, in the result comparison, it is found that the speed and complexity of the round operation optimization algorithm is better than that of the column obfuscation optimization algorithm.
Similar content being viewed by others
References
Zeng, M., Wang, S.: Fuzzy comprehensive evaluation algorithm for power information system security level based on the Internet of Things. Int. J. Online Eng. 12(5), 17–19 (2016)
Ray, B.R., Abawajy, J., Chowdhury, M.: Scalable rid security framework and protocol supporting Internet of Things. Comput. Netw. 67(10), 89–103 (2014)
Mingxin, W.: A design of solving the security problem of Internet of Things based on ellipse curve algorithm. Sens. Transducers 160(12), 570–577 (2013)
Li, Y., Cao, Y.: Performance evaluation and analysis of lightweight symmetric encryption algorithms for Internet of Things. Int. J. Reason. Intell. Syst. 8(1), 84–89 (2016)
Saied, Y.B., Olivereau, A., Zeghlache, D., Laurent, M.: Lightweight collaborative key establishment scheme for the Internet of Things. Comput. Netw. 64(7), 273–295 (2014)
Bucur, D., Iacca, G., Gaudesi, M., et al.: Optimizing groups of colluding strong attackers in mobile urban communication networks with evolutionary algorithms. Appl.Soft Comput. 40(2), 416–426 (2016)
Wu, C.H., Liu, H.S., Lee, Y.F., et al.: A gateway-based inter-PAN binding mechanism for ZigBee sensor networks. IEEE 6854(5), 3808–3813 (2011)
Gelogo, Y.E., Kim, H.K.: An upnp gateway design in zigbee protocol for u-healthcare system. Asia Life Sci. 3(24), 17–28 (2014)
Ali, S.T., Sivaraman, V., Ostry, D.: Eliminating reconciliation cost in secret key generation for body-worn health monitoring devices. IEEE Trans. Mob. Comput. 13(12), 2763–2776 (2014)
Orlinski, M., Filer, N.: Neighbour discovery in opportunistic networks. Ad Hoc Netw. 25(3), 383–392 (2015)
Ijaz, S., Hashmi, F.A., Asghar, S., et al.: Vector based genetic algorithm to optimize predictive analysis in network security. Appl.Intell. 9(2), 1–11 (2017)
Gava, F., Guedj, M., Pommereau, F.: A bsp algorithm for on-the-fly checking ctl* formulas on security protocols. J. Supercomput. 69(2), 629–672 (2014)
Acknowledgements
The authors acknowledge the Fundamental Research Funds for the Central Universities (2012017yjsy217), the National Natural Science Foundation of China (Grant: 111578109), the National Natural Science Foundation of China (Grant: 11111121005).
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Wang, Y., Chen, C. & Jiang, Q. Security algorithm of Internet of Things based on ZigBee protocol. Cluster Comput 22 (Suppl 6), 14759–14766 (2019). https://doi.org/10.1007/s10586-018-2388-4
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10586-018-2388-4