|Table of Contents|

Secure transmission test method of ZigBee protocol based on randomness detection


Research Field:
Publishing date:


Secure transmission test method of ZigBee protocol based on randomness detection
Tang Yongli1Zhao Wenjing1Liang Bo2Zhao Zhangjie2
1.School of Computer Science and Technology,Henan Polytechnic University,Jiaozuo 454003,China; 2.Beijing Information Security Test and Evaluation Center,Beijing 100101,China
internet of things security randomness detection ZigBee protocol encryption testing data frame structure
In order to effectively identify and test the encryption measures of ZigBee protocol,this paper studies secure working mode with ZigBee protocol and proposes a new security testing method based on randomness detection.This method synthetically considers the randomness of test sequences and test effectiveness,and uses the typical randomness detection algorithm to construct a reasonable testing program.By analyzing the characteristics of data frame structure in ZigBee network layer and application layers and testing ZigBee protocol data of different encryption mechanisms,this paper can effectively identify whether the transmission data are encrypted or not.By analyzing the encryption positions of load byte data,this paper can determine the encryption level of the ZigBee protocol data.The experimental results show that this method can accurately identify whether the ZigBee protocol data are encrypted and use the encryption level and can effectively test the encryption strength.


[1] GB/T 22239-2008,信息安全技术 信息系统安全等级保护基本要求[S].
Fan Limin,Feng Dengguo,Chen Hua.Study on the correlation between randomness tests based on entropy[J].Journal of Software,2009,20(7):1967-1976.
[3]Tsang W W,Hui L C K,Chow K P,et al.Tuning the collision test for power[A].Proceedings of the 27th Australasian Conference on Computer Science[C].Darlinghurst,Australia:Australian Computer Society,2004:23-30.
[4]Wang Dechang,Cui Xuenan,Park E,et al.Adaptive flame detection using randomness testing and robust features[J].Fire Safety Journal,2013,55:116-125.
Dong Mancai,Rui Xiaoting,Wang Guoping.Analysis methods of random eigenvalue of mutibody system with random parameters[J].Journal of Nanjing University of Science and Technology,2006,30(4):458-461.
Chen Jianrui,He Zengying.Zigbee protocol optimization simulation algorithm based on dynamic optimization factors[J].Computer Simulation,2013,30(7):272-275.
[7]Bakhache B,Ghazal J M,Assa S E.Improvement of the security of ZigBee by a New Chaotic Algorithm[J].IEEE Systems Journal,2013,3:1-10.
[8]Yang Bin,Fu Renyi,Diao Jianzhong,et al.Security mechanisms analysis for ZigBee standard based on AES-CCM*[J].Advanced Materials Research,2012,468-471:1359-1362.
[9]El-Hamawi E,Bakhache B,Rostom R.An improved authenticated key agreement protocol for low power networks[A].Proceedings of the 17 IEEE Mediterranean Electrotechnical Conference[C].Beirut,Lebanon:IEEE,2014:426-431.
Ren Xiuli,Yu Haibin.Study on security of ZigBee wireless sensor network[J].Chinese Journal of Scientific Instrument,2007,12(28):2132-2137.
Shi Guodong,Kang Fei,Gu Haiwen.Research and implementation of randomness tests[J].Computer Engineering,2009,35(20):145-147.
[14]NIST SP 800-22 Revision 1a-2010,A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications[S].
[15]ZigBee Document 053474r17-2008,ZigBee Specification[S].


Last Update: 2015-02-28