...
首页> 外文期刊>Journal of Engineering & Applied Sciences >A Study on Improvement of Device Removal Processes from ZigBee Network
【24h】

A Study on Improvement of Device Removal Processes from ZigBee Network

机译:ZigBee网络改进设备去除过程的研究

获取原文
获取原文并翻译 | 示例
           

摘要

Device removal from TC starts when TC transmits a remove-device command to ZA. ZA which received the remove-device command, transmit a remove-device command back to ZB. When commands are all transferred, TC deletes ZB from the device management list and all devices in the network delete their shared keys with ZB. At this time, the remove-device command from TC is encrypted by LKA, however, the leave command from ZA to ZB is not encrypted. The proposal from the thesis is as follows. First of all, make sure that devices which transmitted a command have the capability to be identified by including MIC, a shared key between two devices in the command that cannot ensure its integrity as it is not encrypted. Second, make counterfeit and falsification of a command by other devices impossible through encryption of the command for a removal process with a shared key between two devices. The result of the thesis as follows. First of all, upon possible counterfeit and falsification of a command originating from a leave command which has not been encrypted being transmitted from ZA to ZB, ensure the integrity of the command via encryption with LKAB and allow the sender of the remove-device command to be identified as TC by including MIC (LKB) in the leave command. Second by including MIC(LKB) value in the leave command, the sender of leave command can be identified as ZB, then through encryption with LKAB, other devices which do not know the code are made impossible to counterfeit or falsify the command. The improved proposal for device removal processes from ZigBee network assumes that there is a key safely shared between devices. Hence, when the shared key is exposed to other devices counterfeit and falsification becomes available with the key, further, other devices can disguise themselves as proper devices. Thus, additional research is necessary to securely store and manage the shared key.
机译:当TC将删除设备命令传输到ZA时,从TC从TC移除的设备启动。收到remove-device命令的za将remove-device命令发送回zb。当所有传输命令时,TC从设备管理列表中删除ZB,网络中的所有设备都将其共享密钥与ZB一起删除。此时,来自TC的remove-Device命令由LKA加密,但是,来自Za到Zb的LEFT命令未加密。论文的提案如下。首先,确保传输命令的设备具有通过包括麦克风的功能来识别的能力,该命令中的两个设备之间的共享密钥,不能保证其完整性,因为它没有加密。其次,通过在两个设备之间的共享密钥的删除过程的命令加密来伪造和伪造其他设备的命令。论文的结果如下。首先,在可能的伪造和伪造出来的命令,源自从za到zb被加密的休假命令,请通过使用lkab加密来确保命令的完整性,并允许删除设备命令的发件人通过休假命令中包含麦克风(LKB)被识别为TC。第二,在LEFT命令中包含麦克风(LKB)值,Leave命令的发件人可以被标识为ZB,然后通过加密使用LKAB,其他不知道代码的设备无法伪造或伪造命令。来自ZigBee网络的设备删除过程的改进提案假定在设备之间安全地共享密钥。因此,当共享密钥暴露于其他设备时,伪造和伪造能够通过密钥可用,另外,其他设备可以将自己伪装为适当的设备。因此,需要额外的研究来安全地存储和管理共享密钥。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号