Document Type : Research Paper


Computer Science Department, University of Technology - Iraq


ZigBee is consuming low energy and providing the protection in Wireless Sensor Networks. ZigBee pro is supporting most applications. In spite of improved the security, ZigBee pro weak in key administration. In this paper, we depend on Logistic Map Diffie Hellman (LMDH) and SubMAC for Wireless Sensor Networks by ZigBee. In addition, we will improve the security in ZigBee by using the Rivest-ShamirAdleman (RSA) algorithm instead of Advanced Encryption Standard (AES). LMDH used for improved key administration schema (protect key distribution) and SubMAC used for providing authentication and prevented Man-In-The-Middle (MITM) and Replay attacks, LMHD did not provide this service, so we use SubMAC to overcome with this problem, and use RSA to improve the security by encrypting the network key and ensure that the connection is secure between the nodes and then we can send the data safely. And the results ensure: the proposed is extra effective when compare with ZigBee pro from where the execution time and power consumption, in addition, it proved that security is improving.


Main Subjects

[1] T. Alhmiedat, “Low-power Environmental
Monitoring System for ZigBee Wireless Sensor
Network”, VOL. 11, NO. 10, Oct. 2017.
[2] ZigBee Alliance, “ZigBee-2007 Specification,”
San Ramon, CA 94583January 2008.
[3] N. Challa, H. Cam, and M. Sikri, “Secure and
Efficient Data Transmission over Body Sensor and
Wireless Networks,” EURASIP Journal on Wireless
Communications and Networking, VOL 2008, Article
ID 291365, 18 pages, February 2008.
[4] S.M. Soliman, B. Magdy and M.A. Abd El Ghany,
“Efficient Implementation of the AES Algorithm for
Security Applications,” IEEE, 2016.
[5] C. Alcaraz, and J. Lopez, “A Security Analysis for
Wireless Sensor Mesh Networks in highly Critical
Systems,” IEEE. Transactions on Systems, MAN, and
Cybernetics, Part C: Applications and Reviews, Vol.
40, No. 4, July 2010.
[6] K. Choi, M. Yun, and K. Chae and M. Kim, “An
Enhanced Key Management Using ZigBee Pro for
Wireless Sensor Networks,” IEEE, 2012.
[7] N. Koblitz, “Elliptic curve cryptosystems,”
Mathematics of Computation, Vol. 48, No. 177,
January 1987.
[8] Q. He, Q. Qi, Y. Zhao, W. Huang, and Q. Huang,
“The Application of Chaotic Encryption in Industrial
Control Based on ZigBee Wireless Network,” IEEE,
[9] V.C. Preduna, F.M. Jimenez and A.P. Manguillot,
“The logistic map of matrices,” Universitat Politecnica
de Valencia, September 13, 2012.
[10] W. Diffie, and M. E. Hellman, “New Direction in
Cryptography,” IEEE Transactions on Information
Theory, 1976.
[11] W. Jirakitpuwapat and P. Kumam, “The
Generalized Diffie-Hellman Key Exchange Protocol on
Groups,” Springer International Publishing AG 2018.
[12] M. Ahmed, B. Sanjabi, D. Aldiaz, A. Rezaei, and
H. Omotunde, “Diffie-Hellman and Its Application in
Security Protocols,” Certified International Journal of
Engineering Science and Innovative Technology
(IJESIT) Volume 1, Issue 2, November 2012.
[13] G. Singh and Supriya “A Study of Encryption
Algorithms (RSA, DES, 3DES and AES) for
Information Security,” International Journal of
Computer Applications (0975 – 8887) VOL 67, No.19,
April 2013.
[14] U. Somani, K. Lakhani and M. Mundra,
“Implementing Digital Signatures with RSA
Encryption Algorithm to Enhance the Data Security
of Cloud in Cloud Computing,” 1st International
Conference on Parallel, Distributed and Grid
Computing (PDGC), Solan, India, pp. 211-216, 2010.
[15] A.J. Menezes, P.C. Van Oorschot, and S.A.
Vanstone, “Handbook of applied cryptography,” 1996.
[16] A.K. Farhan, N.A. Hasan, “Improved key
management using ZigBee Pro and logistic map for
wireless sensor networks,” 3st International Scientific
Conference on Integration between government
institutions and private sector institutions - constraints
and prospects for success, Baghdad, Iraq, 2019.
[17] K. Choi, M.-H. Kim, K.-J. Chae, J.-J. Park, and
S.-S. Joo, “An Efficient Data Fusion and Assurance
Mechanism using Temporal and Spatial Correlations
for Home Automation Networks,” IEEE Transactions
on Consumer Electronics, VOL. 55, No. 3, August