Advance comprehensive analysis for Zigbee network-based IoT system security
Zigbee is a wireless network technology that operates on a community-based infrastructure. The primary objective of this system is to allow for the effective and inexpensive transmission of information across intelligent devices, focusing on minimizing latency and addressing potential challenges. Th...
Saved in:
Published in | Discover Computing Vol. 27; no. 1; p. 22 |
---|---|
Main Authors | , , |
Format | Journal Article |
Language | English |
Published |
Dordrecht
Springer Netherlands
24.07.2024
Springer Nature B.V |
Subjects | |
Online Access | Get full text |
ISSN | 2948-2992 1386-4564 2948-2992 1573-7659 |
DOI | 10.1007/s10791-024-09456-3 |
Cover
Summary: | Zigbee is a wireless network technology that operates on a community-based infrastructure. The primary objective of this system is to allow for the effective and inexpensive transmission of information across intelligent devices, focusing on minimizing latency and addressing potential challenges. The prominence of security risks related to the Zigbee community has escalated due to the expanded implementation of Zigbee technology. The Zigbee community has implemented measures to mitigate network disruptions, prevent unauthorized access, and protect against the interception of statistical data. A plethora of encryption algorithms have been developed. The encryption technologies employed encompass a 128-bit Advanced Encryption Standard (AES) to encrypt data during transfer. Cryptographically safe protocols (CSPs) are implemented to ensure safe connections and authentication. This research introduces an innovative methodology for assessing the security of Zigbee community-based Internet of Things (IoT) systems. This article thoroughly examines the security concerns associated with Zigbee technology. Adopting intelligent design concepts in the construction of IoT devices facilitates the implementation of robust security measures and reliable detection systems to mitigate potential assaults. The system can implement access control mechanisms based on authentication, guaranteeing the secure management of devices, networks, and protocols and facilitating the secure installation of software updates. |
---|---|
Bibliography: | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
ISSN: | 2948-2992 1386-4564 2948-2992 1573-7659 |
DOI: | 10.1007/s10791-024-09456-3 |