Zigbee Specification

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 306 Experts worldwide ranked by ideXlab platform

Jelena Misic - One of the best experts on this subject based on the ideXlab platform.

  • Performance implications of periodic key exchanges and packet integrity overhead in an 802.15.4 beacon enabled cluster
    International Journal of Sensor Networks, 2008
    Co-Authors: Jelena Misic, Fereshteh Amini, Moazzam Khan
    Abstract:

    In this paper, we describe and evaluate a secure data exchange protocol based on the Zigbee Specification and built on top of 802.15.4 beacon enabled link layer. This protocol includes a key exchange mechanism and addition of Message Authenication Code to each packet. We have simulated key exchange protocol over physical and data link layers in IEEE 802.15.4 beacon enabled cluster. Since key distribution protocol requires downlink data transmissions which have complex implementation, its communication cost is high. Our results indicate that even for small cluster size, frequent key exchanges impose a serious performance burden on the data traffic. Therefore, the period for key exchanges (i.e. the degree of security protection) has to be traded for the cluster size and throughput.

  • the cost of security performance of Zigbee key exchange mechanism in an 802 15 4 beacon enabled cluster
    Mobile Adhoc and Sensor Systems, 2006
    Co-Authors: Moazzam Khan, Fereshteh Amini, Jelena Misic, Vojislav B Misic
    Abstract:

    The IEEE 802.15.4 Specification is a recent low data rate wireless personal area network standard. While basic security services are provided for, there is a lack of more advanced techniques which are indispensable in modern personal area network applications. In addition, performance implications of those services are not known. In this paper, we describe a secure data exchange protocol based on the Zigbee Specification and built on top of 802.15.4 link layer. This protocol includes a key exchange mechanism. Then, we evaluate the overhead of this scheme under different application scenarios. Initial results show the range of network and traffic parameters wherein the proposed scheme is feasible to use.

  • MSN - Key Exchange in 802.15.4 Networks and Its Performance Implications
    Lecture Notes in Computer Science, 2006
    Co-Authors: Moazzam Khan, Fereshteh Amini, Jelena Misic
    Abstract:

    The IEEE 802.15.4 Specification is a recent low data rate wireless personal area network standard. While basic security services are provided for, there is a lack of more advanced techniques which are indispensable in modern personal area network applications. In addition, performance implications of those services are not known. In this paper, we describe a secure data exchange protocol based on the Zigbee Specification and built on top of 802.15.4 link layer. This protocol includes a key exchange mechanism. Then, we evaluate the overhead of this scheme under different application scenarios. Initial results show the range of network and traffic parameters wherein the proposed scheme is feasible to use.

  • MASS - The Cost of Security: Performance of Zigbee Key Exchange Mechanism in an 802.15.4 Beacon Enabled Cluster
    2006 IEEE International Conference on Mobile Ad Hoc and Sensor Sysetems, 2006
    Co-Authors: Moazzam Khan, Fereshteh Amini, Jelena Misic, Vojislav B Misic
    Abstract:

    The IEEE 802.15.4 Specification is a recent low data rate wireless personal area network standard. While basic security services are provided for, there is a lack of more advanced techniques which are indispensable in modern personal area network applications. In addition, performance implications of those services are not known. In this paper, we describe a secure data exchange protocol based on the Zigbee Specification and built on top of 802.15.4 link layer. This protocol includes a key exchange mechanism. Then, we evaluate the overhead of this scheme under different application scenarios. Initial results show the range of network and traffic parameters wherein the proposed scheme is feasible to use.

  • Key exchange in 802.15.4 networks and its performance implications
    Lecture Notes in Computer Science, 2006
    Co-Authors: Moazzam Khan, Fereshteh Amini, Jelena Misic
    Abstract:

    The IEEE 802.15.4 Specification is a recent low data rate wireless personal area network standard. While basic security services are provided for, there is a lack of more advanced techniques which are indispensable in modem personal area network applications. In addition, performance implications of those services are not known. In this paper, we describe a secure data exchange protocol based on the Zigbee Specification and built on top of 802.15.4 link layer. This protocol includes a key exchange mechanism. Then, we evaluate the overhead of this scheme under different application scenarios. Initial results show the range of network and traffic parameters wherein the proposed scheme is feasible to use.

Moazzam Khan - One of the best experts on this subject based on the ideXlab platform.

  • Power Management and Security in IEEE 802.15.4 Clusters: How to Balance?
    2016
    Co-Authors: Fereshteh Amini, Moazzam Khan
    Abstract:

    The IEEE 802.15.4 Specification is a recent low data rate wireless per-sonal area network standard. While basic security services are provided for, there is a lack of more advanced techniques which are indispensable in modern personal area network applications. In addition, performance implications of those services are not known. In this chapter, we de-scribe a secure data exchange protocol based on the Zigbee Specification and built on top of IEEE 802.15.4 link layer. This protocol includes a key exchange mechanism. We assume that all nodes are applying power management technique based on the constant event sensing reliability re-quired by the coordinator. Power management generates random sleep times by every node which in average fairly distributes the sensing load among the nodes. Key exchange is initiated by cluster coordinator after some given number of sensing packets have been received by the coor-dinator. We develop and integrate simulation model of key exchange and power management technique into cluster’s reliable sensing func

  • Performance of IEEE 802.15.4 Clusters with Power Management and Key Exchange
    Journal of Computer Science and Technology, 2008
    Co-Authors: Fereshteh Amini, Moazzam Khan, Jelena Mišić, Hossein Pourreza
    Abstract:

    The IEEE 802.15.4 Specification is a recent low data rate wireless personal area network standard. While basic security services are provided for, there is a lack of more advanced techniques which are indispensable in modern personal area network applications. In addition, performance implications of those services are not known. In this paper, we describe a secure data exchange protocol based on the Zigbee Specification and built on top of IEEE 802.15.4 link layer. This protocol includes a key exchange mechanism. We assume that all nodes are applying power management technique based on the constant event sensing reliability required by the coordinator. Power management generates random sleep times by every node which in average fairly distributes the sensing load among the nodes. Key exchange is initiated by a cluster coordinator after some given number of sensing packets have been received by the coordinator. We develop and integrate simulation model of the key exchange and power management technique into the cluster’s reliable sensing function. We evaluate the impact of security function and its periodicity on cluster performance.

  • Performance implications of periodic key exchanges and packet integrity overhead in an 802.15.4 beacon enabled cluster
    International Journal of Sensor Networks, 2008
    Co-Authors: Jelena Misic, Fereshteh Amini, Moazzam Khan
    Abstract:

    In this paper, we describe and evaluate a secure data exchange protocol based on the Zigbee Specification and built on top of 802.15.4 beacon enabled link layer. This protocol includes a key exchange mechanism and addition of Message Authenication Code to each packet. We have simulated key exchange protocol over physical and data link layers in IEEE 802.15.4 beacon enabled cluster. Since key distribution protocol requires downlink data transmissions which have complex implementation, its communication cost is high. Our results indicate that even for small cluster size, frequent key exchanges impose a serious performance burden on the data traffic. Therefore, the period for key exchanges (i.e. the degree of security protection) has to be traded for the cluster size and throughput.

  • the cost of security performance of Zigbee key exchange mechanism in an 802 15 4 beacon enabled cluster
    Mobile Adhoc and Sensor Systems, 2006
    Co-Authors: Moazzam Khan, Fereshteh Amini, Jelena Misic, Vojislav B Misic
    Abstract:

    The IEEE 802.15.4 Specification is a recent low data rate wireless personal area network standard. While basic security services are provided for, there is a lack of more advanced techniques which are indispensable in modern personal area network applications. In addition, performance implications of those services are not known. In this paper, we describe a secure data exchange protocol based on the Zigbee Specification and built on top of 802.15.4 link layer. This protocol includes a key exchange mechanism. Then, we evaluate the overhead of this scheme under different application scenarios. Initial results show the range of network and traffic parameters wherein the proposed scheme is feasible to use.

  • MSN - Key Exchange in 802.15.4 Networks and Its Performance Implications
    Lecture Notes in Computer Science, 2006
    Co-Authors: Moazzam Khan, Fereshteh Amini, Jelena Misic
    Abstract:

    The IEEE 802.15.4 Specification is a recent low data rate wireless personal area network standard. While basic security services are provided for, there is a lack of more advanced techniques which are indispensable in modern personal area network applications. In addition, performance implications of those services are not known. In this paper, we describe a secure data exchange protocol based on the Zigbee Specification and built on top of 802.15.4 link layer. This protocol includes a key exchange mechanism. Then, we evaluate the overhead of this scheme under different application scenarios. Initial results show the range of network and traffic parameters wherein the proposed scheme is feasible to use.

Yu-chee Tseng - One of the best experts on this subject based on the ideXlab platform.

  • Zigbee-based long-thin wireless sensor networks: address assignment and routing schemes
    International Journal of Ad Hoc and Ubiquitous Computing, 2013
    Co-Authors: Meng-shiuan Pan, Yu-chee Tseng
    Abstract:

    Although Wireless Sensor Networks WSNs have been extensively researched, its deployment is still a big concern. This paper makes two contributions to this issue. First, we promote a new concept of Long-Thin LT topology for WSNs, where a network may have a number of linear paths of nodes as backbones connecting to each other. These backbones are to extend the network to the intended coverage areas. At the first glance, a LT WSN only seems to be a special case of numerous WSN topologies. However, we observe, from real deployment experiences, that such a topology is quite general in many applications and deployments. The second contribution is that we show that the address assignment and thus the tree routing scheme defined in the original Zigbee Specification may work poorly, if not fail, in a LT topology. We then propose simple, yet efficient, address assignment and routing schemes for a LT WSN. Simulation results are reported.

  • VTC Spring - Address Assignment and Routing Schemes for Zigbee-Based Long-Thin Wireless Sensor Networks
    VTC Spring 2008 - IEEE Vehicular Technology Conference, 2008
    Co-Authors: Meng-shiuan Pan, Hua-wei Fang, Yung-chih Liu, Yu-chee Tseng
    Abstract:

    Wireless sensor networks (WSNs) have been extensively researched recently. This paper makes two contributions to this field. First, we promote a new concept of long-thin (LT) topology for WSNs, where a network may have a number of linear paths of nodes as backbones connecting to each other. These backbones are to extend the network to the intended coverage areas. At the first glance, a LT WSN only seems to be a special case of numerous WSN topologies. However, we observe, from real deployment experiments, that such a topology is quite general in many applications and deployments. The second contribution is that we show that the address assignment and thus the tree routing scheme defined in the original Zigbee Specification may work poorly, if not fail, in a LT topology. We thus propose simple, yet efficient, address assignment and routing schemes for a LT WSN. Simulation results and prototyping experiences are also reported.

Fereshteh Amini - One of the best experts on this subject based on the ideXlab platform.

  • Power Management and Security in IEEE 802.15.4 Clusters: How to Balance?
    2016
    Co-Authors: Fereshteh Amini, Moazzam Khan
    Abstract:

    The IEEE 802.15.4 Specification is a recent low data rate wireless per-sonal area network standard. While basic security services are provided for, there is a lack of more advanced techniques which are indispensable in modern personal area network applications. In addition, performance implications of those services are not known. In this chapter, we de-scribe a secure data exchange protocol based on the Zigbee Specification and built on top of IEEE 802.15.4 link layer. This protocol includes a key exchange mechanism. We assume that all nodes are applying power management technique based on the constant event sensing reliability re-quired by the coordinator. Power management generates random sleep times by every node which in average fairly distributes the sensing load among the nodes. Key exchange is initiated by cluster coordinator after some given number of sensing packets have been received by the coor-dinator. We develop and integrate simulation model of key exchange and power management technique into cluster’s reliable sensing func

  • Performance of IEEE 802.15.4 Clusters with Power Management and Key Exchange
    Journal of Computer Science and Technology, 2008
    Co-Authors: Fereshteh Amini, Moazzam Khan, Jelena Mišić, Hossein Pourreza
    Abstract:

    The IEEE 802.15.4 Specification is a recent low data rate wireless personal area network standard. While basic security services are provided for, there is a lack of more advanced techniques which are indispensable in modern personal area network applications. In addition, performance implications of those services are not known. In this paper, we describe a secure data exchange protocol based on the Zigbee Specification and built on top of IEEE 802.15.4 link layer. This protocol includes a key exchange mechanism. We assume that all nodes are applying power management technique based on the constant event sensing reliability required by the coordinator. Power management generates random sleep times by every node which in average fairly distributes the sensing load among the nodes. Key exchange is initiated by a cluster coordinator after some given number of sensing packets have been received by the coordinator. We develop and integrate simulation model of the key exchange and power management technique into the cluster’s reliable sensing function. We evaluate the impact of security function and its periodicity on cluster performance.

  • Performance implications of periodic key exchanges and packet integrity overhead in an 802.15.4 beacon enabled cluster
    International Journal of Sensor Networks, 2008
    Co-Authors: Jelena Misic, Fereshteh Amini, Moazzam Khan
    Abstract:

    In this paper, we describe and evaluate a secure data exchange protocol based on the Zigbee Specification and built on top of 802.15.4 beacon enabled link layer. This protocol includes a key exchange mechanism and addition of Message Authenication Code to each packet. We have simulated key exchange protocol over physical and data link layers in IEEE 802.15.4 beacon enabled cluster. Since key distribution protocol requires downlink data transmissions which have complex implementation, its communication cost is high. Our results indicate that even for small cluster size, frequent key exchanges impose a serious performance burden on the data traffic. Therefore, the period for key exchanges (i.e. the degree of security protection) has to be traded for the cluster size and throughput.

  • Simulation and Evaluation of Security and Intrusion Detection in IEEE 802.15.4 Network
    2008
    Co-Authors: Fereshteh Amini
    Abstract:

    With the fast growth of wireless sensor technology, the idea of using Wireless Sensor Networks (WSNs) in more critical applications of real life is becoming popular. WSNs are restricted in energy, memory and bandwidth which makes them particularly vulnerable against intrusions. Security is important and needs to be considered for any WSN. The standard Specification of IEEE 802.15.4, as one technology of such networks, introduces many constraints which makes the application of security even harder. In addition, WSNs are vulnerable to an intruder’s malicious attacks because of their characteristics and the nature of applications they are used for. In this thesis, I describe a secure data exchange protocol including a key exchange mechanism based on the Zigbee Specification and built on top of IEEE 802.15.4 link layer. All nodes will apply power management technique based on the constant event sensing reliability required by the coordinator. Power management generates random sleep times by every node which on average fairly distributes the sensing load among the nodes. Key exchange is initiated by cluster coordinator after some given number of sensing packets have been received by the coordinator. On the other hand cheap devices and accessibility of these sensors, encourage adversaries to launch physical

  • the cost of security performance of Zigbee key exchange mechanism in an 802 15 4 beacon enabled cluster
    Mobile Adhoc and Sensor Systems, 2006
    Co-Authors: Moazzam Khan, Fereshteh Amini, Jelena Misic, Vojislav B Misic
    Abstract:

    The IEEE 802.15.4 Specification is a recent low data rate wireless personal area network standard. While basic security services are provided for, there is a lack of more advanced techniques which are indispensable in modern personal area network applications. In addition, performance implications of those services are not known. In this paper, we describe a secure data exchange protocol based on the Zigbee Specification and built on top of 802.15.4 link layer. This protocol includes a key exchange mechanism. Then, we evaluate the overhead of this scheme under different application scenarios. Initial results show the range of network and traffic parameters wherein the proposed scheme is feasible to use.

Pekka Toivanen - One of the best experts on this subject based on the ideXlab platform.

  • HICSS - Security Threats in Zigbee-Enabled Systems: Vulnerability Evaluation, Practical Experiments, Countermeasures, and Lessons Learned
    2013 46th Hawaii International Conference on System Sciences, 2013
    Co-Authors: Niko Vidgren, José Luis Patiño-andres, Juan José Ramírez-sanchis, Keijo Haataja, Pekka Toivanen
    Abstract:

    In this paper, two practical attacks against Zigbee security are proposed and the latter one is also carried out in our laboratory environment. The attack scenarios are based on utilizing several vulnerabilities found from the main security components of Zigbee technology. The first attack is based on sabotaging the Zigbee End-Device by sending a special signal that makes it wake-up constantly until the battery runs out. The second attack is based on exploiting the key exchange process in Zigbee when using the Standard Security level defined by the Zigbee Specification: we also demonstrate with experimental figures that attacks against Zigbee-enabled devices become practical by using our attack scenario. In addition, countermeasures that render the proposed attacks impractical, although not totally eliminating their potential danger, are devised. Moreover, some new ideas that will be used in our future research work are proposed.

  • Security Threats in Zigbee-Enabled Systems: Vulnerability Evaluation, Practical Experiments, Countermeasures, and Lessons Learned
    2013 46th Hawaii International Conference on System Sciences, 2013
    Co-Authors: Niko Vidgren, José Luis Patiño-andres, Juan José Ramírez-sanchis, Keijo Haataja, Pekka Toivanen
    Abstract:

    In this paper, two practical attacks against Zigbee security are proposed and the latter one is also carried out in our laboratory environment. The attack scenarios are based on utilizing several vulnerabilities found from the main security components of Zigbee technology. The first attack is based on sabotaging the Zigbee End-Device by sending a special signal that makes it wake-up constantly until the battery runs out. The second attack is based on exploiting the key exchange process in Zigbee when using the Standard Security level defined by the Zigbee Specification: we also demonstrate with experimental figures that attacks against Zigbee-enabled devices become practical by using our attack scenario. In addition, countermeasures that render the proposed attacks impractical, although not totally eliminating their potential danger, are devised. Moreover, some new ideas that will be used in our future research work are proposed.