{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,18]],"date-time":"2025-02-18T23:10:16Z","timestamp":1739920216773,"version":"3.37.3"},"reference-count":26,"publisher":"Wiley","issue":"2","license":[{"start":{"date-parts":[[2010,3,1]],"date-time":"2010-03-01T00:00:00Z","timestamp":1267401600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Wireless Communications"],"published-print":{"date-parts":[[2012,2,10]]},"abstract":"Abstract<\/jats:title>ZigBee uses the network security and application profile layers of the IEEE 802.15.4 and ZigBee Alliance standards for reliable, low\u2010powered, wireless data communications. However, the ZigBee protocol has some security weaknesses for newly joining devices. In this paper, these weaknesses are analyzed and a novel elliptical curve identity\u2010based cryptography (ECIC) protocol is presented to improve the security level of ZigBee networks. The proposed method provides perfect forward secrecy and enables network key transmission between nodes. Therefore, the traffic concentrated on the trustcenter is diminished, and the network efficiency is improved by reducing the key establishment time and processing burden on each sensor node, thereby reducing the overall energy consumption of the sensor network. Copyright \u00a9 2010 John Wiley & Sons, Ltd.<\/jats:p>","DOI":"10.1002\/wcm.947","type":"journal-article","created":{"date-parts":[[2010,3,1]],"date-time":"2010-03-01T09:49:38Z","timestamp":1267436978000},"page":"145-157","source":"Crossref","is-referenced-by-count":10,"title":["A novel elliptical curve ID cryptography protocol for multi\u2010hop ZigBee sensor networks"],"prefix":"10.1002","volume":"12","author":[{"given":"Hyunjue","family":"Kim","sequence":"first","affiliation":[]},{"given":"Chang Hyun","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Jong\u2010Moon","family":"Chung","sequence":"additional","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2012,1,18]]},"reference":[{"key":"e_1_2_8_2_2","unstructured":"ZigBee Alliance. ZigBee specification.Technical Report Document 053474r06 Ver. 1.0 ZigBee Alliance 2005."},{"key":"e_1_2_8_3_2","unstructured":"\u2018Standard for part 15.4: Wireless medium access control (MAC) and physical layer (PHY) specifications for low rate wireless personal area networks (LR\u2010WPAN) \u2019 IEEE Std 802.15.4 2003."},{"volume-title":"ZigBee Resource Guide","year":"2008","author":"West K","key":"e_1_2_8_4_2"},{"issue":"2","key":"e_1_2_8_5_2","first-page":"18","article-title":"Securing ZigBee: building robust, reliable sensor networks","volume":"12","author":"Blaser M","year":"2006","journal-title":"Portable Design"},{"issue":"2","key":"e_1_2_8_6_2","first-page":"35","article-title":"Industrial\u2010strength security for ZigBee: the case for public\u2010key cryptography","volume":"3","author":"Blaser M","year":"2005","journal-title":"Embedded Computer Design"},{"key":"e_1_2_8_7_2","first-page":"47","volume-title":"Proceedings of Advances in Cryptology, Crypto'84","author":"Shamir A","year":"1985"},{"key":"e_1_2_8_8_2","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45682-1_30"},{"key":"e_1_2_8_9_2","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44647-8_13"},{"key":"e_1_2_8_10_2","first-page":"117","volume-title":"Proceedings of Pacific\u2010Rim Conference on Multimedia PCM 2005","author":"Kim H","year":"2005"},{"key":"e_1_2_8_11_2","unstructured":"GorantlaMC GangishettiR SaxenaA.A survey on ID\u2010based cryptographic primitives.Cryptology ePrint Archive Report 2004\/131 available at:iacr.org\/2005\/094\/."},{"key":"e_1_2_8_12_2","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-39799-X_31"},{"key":"e_1_2_8_13_2","doi-asserted-by":"publisher","DOI":"10.1090\/S0025-5718-1987-0866109-5"},{"key":"e_1_2_8_14_2","doi-asserted-by":"crossref","unstructured":"LiuA NingP.TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks.Proc. 7th IEEE International Conference on Information Processing in Sensor Networks IPSN 2008 April2008; pp.245\u2013256.","DOI":"10.1109\/IPSN.2008.47"},{"key":"e_1_2_8_15_2","first-page":"119","volume-title":"Comparing elliptic curve cryptography and RSA on 8\u2010bit CPUs","author":"Gura N","year":"2004"},{"key":"e_1_2_8_16_2","doi-asserted-by":"crossref","unstructured":"WanderAS GuraN EberleH GuptaV ShantzSC.Energy analysis of public\u2010key cryptography for wireless sensor networks.Proceedings of 3rd IEEE International Conference on Pervasive Computing and Communication PerCom 2005 March2005;324\u2013328.","DOI":"10.1109\/PERCOM.2005.18"},{"key":"e_1_2_8_17_2","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"key":"e_1_2_8_18_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1976.1055638"},{"key":"e_1_2_8_19_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1985.1057074"},{"key":"e_1_2_8_20_2","unstructured":"DaemenJ RijmenV.AES proposal: rijndael. In AES Algorithm Submission 1999. available at:http:\/\/www.csrc.nist.gov\/encryption\/aes\/rijndael\/Rijndael.pdf."},{"key":"e_1_2_8_21_2","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-003-0052-4"},{"key":"e_1_2_8_22_2","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0054130"},{"key":"e_1_2_8_23_2","doi-asserted-by":"publisher","DOI":"10.1109\/49.839937"},{"key":"e_1_2_8_24_2","unstructured":"ManezesAJ QuM VanstoneSA.Some new key agreement protocols providing mutual implicit authentication.Proceedings of Workshop on Selected Areas in Cryptography SAC 1995 May1995;22\u201332."},{"key":"e_1_2_8_25_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-006-9033-6"},{"key":"e_1_2_8_26_2","doi-asserted-by":"crossref","unstructured":"OliveiraLB AranhaDF MoraisE DaguanoF.TinyTate: Computing the Tate pairing in resource\u2010constrained sensor nodes.Proceedings of IEEE International Symposium on Network Computing and Applications NCA 2007 July2007;318\u2013323.","DOI":"10.1109\/NCA.2007.48"},{"key":"e_1_2_8_27_2","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2004.1261814"}],"container-title":["Wireless Communications and Mobile Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fwcm.947","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/wcm.947","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,18]],"date-time":"2025-02-18T22:34:41Z","timestamp":1739918081000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/wcm.947"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,1,18]]},"references-count":26,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2012,2,10]]}},"alternative-id":["10.1002\/wcm.947"],"URL":"https:\/\/doi.org\/10.1002\/wcm.947","archive":["Portico"],"relation":{},"ISSN":["1530-8669","1530-8677"],"issn-type":[{"type":"print","value":"1530-8669"},{"type":"electronic","value":"1530-8677"}],"subject":[],"published":{"date-parts":[[2012,1,18]]}}}