Skip to main content
Log in

Security algorithm of Internet of Things based on ZigBee protocol

  • Published:
Cluster Computing Aims and scope Submit manuscript

Abstract

To study the application of ZigBee protocol in the security algorithm of Internet of Things, the relevant development status at home and abroad is firstly summarized and ZigBee technology is introduced in detail. Then, the principle of AES-128 algorithm is analyzed, and the steps of decryption algorithm are adjusted, so that the decryption algorithm is symmetric in structure and encryption algorithm. In addition, the encryption and decryption algorithm of AES-128 is implemented by using C language. Based on the characteristics of simplicity and low cost of ZigBee technology, the two optimization algorithms are designed and implemented from the analysis of simplicity and efficiency based on the performances of security algorithm. The analysis and test results show that the two optimization algorithms are better than the UN optimized algorithm in terms of speed and complexity. To sum up, in the result comparison, it is found that the speed and complexity of the round operation optimization algorithm is better than that of the column obfuscation optimization algorithm.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig.. 1
Fig.. 2
Fig.. 3
Fig.. 4
Fig.. 5
Fig.. 6
Fig.. 7
Fig.. 8

Similar content being viewed by others

References

  1. Zeng, M., Wang, S.: Fuzzy comprehensive evaluation algorithm for power information system security level based on the Internet of Things. Int. J. Online Eng. 12(5), 17–19 (2016)

    Article  Google Scholar 

  2. Ray, B.R., Abawajy, J., Chowdhury, M.: Scalable rid security framework and protocol supporting Internet of Things. Comput. Netw. 67(10), 89–103 (2014)

    Article  Google Scholar 

  3. Mingxin, W.: A design of solving the security problem of Internet of Things based on ellipse curve algorithm. Sens. Transducers 160(12), 570–577 (2013)

    Google Scholar 

  4. Li, Y., Cao, Y.: Performance evaluation and analysis of lightweight symmetric encryption algorithms for Internet of Things. Int. J. Reason. Intell. Syst. 8(1), 84–89 (2016)

    Google Scholar 

  5. Saied, Y.B., Olivereau, A., Zeghlache, D., Laurent, M.: Lightweight collaborative key establishment scheme for the Internet of Things. Comput. Netw. 64(7), 273–295 (2014)

    Article  Google Scholar 

  6. Bucur, D., Iacca, G., Gaudesi, M., et al.: Optimizing groups of colluding strong attackers in mobile urban communication networks with evolutionary algorithms. Appl.Soft Comput. 40(2), 416–426 (2016)

    Article  Google Scholar 

  7. Wu, C.H., Liu, H.S., Lee, Y.F., et al.: A gateway-based inter-PAN binding mechanism for ZigBee sensor networks. IEEE 6854(5), 3808–3813 (2011)

    Google Scholar 

  8. Gelogo, Y.E., Kim, H.K.: An upnp gateway design in zigbee protocol for u-healthcare system. Asia Life Sci. 3(24), 17–28 (2014)

    Google Scholar 

  9. Ali, S.T., Sivaraman, V., Ostry, D.: Eliminating reconciliation cost in secret key generation for body-worn health monitoring devices. IEEE Trans. Mob. Comput. 13(12), 2763–2776 (2014)

    Article  Google Scholar 

  10. Orlinski, M., Filer, N.: Neighbour discovery in opportunistic networks. Ad Hoc Netw. 25(3), 383–392 (2015)

    Article  Google Scholar 

  11. Ijaz, S., Hashmi, F.A., Asghar, S., et al.: Vector based genetic algorithm to optimize predictive analysis in network security. Appl.Intell. 9(2), 1–11 (2017)

    Google Scholar 

  12. Gava, F., Guedj, M., Pommereau, F.: A bsp algorithm for on-the-fly checking ctl* formulas on security protocols. J. Supercomput. 69(2), 629–672 (2014)

    Article  Google Scholar 

Download references

Acknowledgements

The authors acknowledge the Fundamental Research Funds for the Central Universities (2012017yjsy217), the National Natural Science Foundation of China (Grant: 111578109), the National Natural Science Foundation of China (Grant: 11111121005).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yongkang Wang.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Wang, Y., Chen, C. & Jiang, Q. Security algorithm of Internet of Things based on ZigBee protocol. Cluster Comput 22 (Suppl 6), 14759–14766 (2019). https://doi.org/10.1007/s10586-018-2388-4

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10586-018-2388-4

Keywords

Navigation