Title :
Securing the ZigBee Protocol in the Smart Grid
Author :
Melaragno, Anthony Patrick ; Bandara, Damindra ; Wijesekera, Duminda ; Michael, James Bret
fDate :
4/1/2012 12:00:00 AM
Abstract :
The design-implement-fix process is sufficient for previously unknown attack vectors. However, engineers should use established knowledge, such as known attack patterns, in the analysis of security protocols prior to their acceptance and implementation.
Keywords :
Zigbee; cryptographic protocols; grid computing; ZigBee protocol; attack vectors; design-implement-fix process; security protocols; smart grid; Authentication; NIST; Protocols; Smart grids; Zigbee; formal methods; protocol verification; security; smart grid;
DOI :
10.1109/MC.2012.146