Advertisement

Cluster Computing

, Volume 22, Supplement 6, pp 14759–14766 | Cite as

Security algorithm of Internet of Things based on ZigBee protocol

  • Yongkang WangEmail author
  • Chunxia Chen
  • Qijie Jiang
Article

Abstract

To study the application of ZigBee protocol in the security algorithm of Internet of Things, the relevant development status at home and abroad is firstly summarized and ZigBee technology is introduced in detail. Then, the principle of AES-128 algorithm is analyzed, and the steps of decryption algorithm are adjusted, so that the decryption algorithm is symmetric in structure and encryption algorithm. In addition, the encryption and decryption algorithm of AES-128 is implemented by using C language. Based on the characteristics of simplicity and low cost of ZigBee technology, the two optimization algorithms are designed and implemented from the analysis of simplicity and efficiency based on the performances of security algorithm. The analysis and test results show that the two optimization algorithms are better than the UN optimized algorithm in terms of speed and complexity. To sum up, in the result comparison, it is found that the speed and complexity of the round operation optimization algorithm is better than that of the column obfuscation optimization algorithm.

Keywords

ZigBee protocol Security AES-128 Algorithm optimization 

Notes

Acknowledgements

The authors acknowledge the Fundamental Research Funds for the Central Universities (2012017yjsy217), the National Natural Science Foundation of China (Grant: 111578109), the National Natural Science Foundation of China (Grant: 11111121005).

References

  1. 1.
    Zeng, M., Wang, S.: Fuzzy comprehensive evaluation algorithm for power information system security level based on the Internet of Things. Int. J. Online Eng. 12(5), 17–19 (2016)CrossRefGoogle Scholar
  2. 2.
    Ray, B.R., Abawajy, J., Chowdhury, M.: Scalable rid security framework and protocol supporting Internet of Things. Comput. Netw. 67(10), 89–103 (2014)CrossRefGoogle Scholar
  3. 3.
    Mingxin, W.: A design of solving the security problem of Internet of Things based on ellipse curve algorithm. Sens. Transducers 160(12), 570–577 (2013)Google Scholar
  4. 4.
    Li, Y., Cao, Y.: Performance evaluation and analysis of lightweight symmetric encryption algorithms for Internet of Things. Int. J. Reason. Intell. Syst. 8(1), 84–89 (2016)Google Scholar
  5. 5.
    Saied, Y.B., Olivereau, A., Zeghlache, D., Laurent, M.: Lightweight collaborative key establishment scheme for the Internet of Things. Comput. Netw. 64(7), 273–295 (2014)CrossRefGoogle Scholar
  6. 6.
    Bucur, D., Iacca, G., Gaudesi, M., et al.: Optimizing groups of colluding strong attackers in mobile urban communication networks with evolutionary algorithms. Appl.Soft Comput. 40(2), 416–426 (2016)CrossRefGoogle Scholar
  7. 7.
    Wu, C.H., Liu, H.S., Lee, Y.F., et al.: A gateway-based inter-PAN binding mechanism for ZigBee sensor networks. IEEE 6854(5), 3808–3813 (2011)Google Scholar
  8. 8.
    Gelogo, Y.E., Kim, H.K.: An upnp gateway design in zigbee protocol for u-healthcare system. Asia Life Sci. 3(24), 17–28 (2014)Google Scholar
  9. 9.
    Ali, S.T., Sivaraman, V., Ostry, D.: Eliminating reconciliation cost in secret key generation for body-worn health monitoring devices. IEEE Trans. Mob. Comput. 13(12), 2763–2776 (2014)CrossRefGoogle Scholar
  10. 10.
    Orlinski, M., Filer, N.: Neighbour discovery in opportunistic networks. Ad Hoc Netw. 25(3), 383–392 (2015)CrossRefGoogle Scholar
  11. 11.
    Ijaz, S., Hashmi, F.A., Asghar, S., et al.: Vector based genetic algorithm to optimize predictive analysis in network security. Appl.Intell. 9(2), 1–11 (2017)Google Scholar
  12. 12.
    Gava, F., Guedj, M., Pommereau, F.: A bsp algorithm for on-the-fly checking ctl* formulas on security protocols. J. Supercomput. 69(2), 629–672 (2014)CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2018

Authors and Affiliations

  1. 1.School of Aviation Transportation ManagementCivil Aviation Flight University of ChinaGuanghanChina
  2. 2.School of Economics and ManagementChengdu Technological UniverstyChengduChina
  3. 3.School of BusinessNottingham UniversityNottinghamUK

Personalised recommendations