Advance comprehensive analysis for Zigbee network-based IoT system security

Zigbee is a wireless network technology that operates on a community-based infrastructure. The primary objective of this system is to allow for the effective and inexpensive transmission of information across intelligent devices, focusing on minimizing latency and addressing potential challenges. Th...

Full description

Saved in:
Bibliographic Details
Published inDiscover Computing Vol. 27; no. 1; p. 22
Main Authors Kumar, Manish, Yadav, Vibhash, Yadav, Satya Prakash
Format Journal Article
LanguageEnglish
Published Dordrecht Springer Netherlands 24.07.2024
Springer Nature B.V
Subjects
Online AccessGet full text
ISSN2948-2992
1386-4564
2948-2992
1573-7659
DOI10.1007/s10791-024-09456-3

Cover

More Information
Summary:Zigbee is a wireless network technology that operates on a community-based infrastructure. The primary objective of this system is to allow for the effective and inexpensive transmission of information across intelligent devices, focusing on minimizing latency and addressing potential challenges. The prominence of security risks related to the Zigbee community has escalated due to the expanded implementation of Zigbee technology. The Zigbee community has implemented measures to mitigate network disruptions, prevent unauthorized access, and protect against the interception of statistical data. A plethora of encryption algorithms have been developed. The encryption technologies employed encompass a 128-bit Advanced Encryption Standard (AES) to encrypt data during transfer. Cryptographically safe protocols (CSPs) are implemented to ensure safe connections and authentication. This research introduces an innovative methodology for assessing the security of Zigbee community-based Internet of Things (IoT) systems. This article thoroughly examines the security concerns associated with Zigbee technology. Adopting intelligent design concepts in the construction of IoT devices facilitates the implementation of robust security measures and reliable detection systems to mitigate potential assaults. The system can implement access control mechanisms based on authentication, guaranteeing the secure management of devices, networks, and protocols and facilitating the secure installation of software updates.
Bibliography:ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ISSN:2948-2992
1386-4564
2948-2992
1573-7659
DOI:10.1007/s10791-024-09456-3