12-CRS-0106 REVISED 8 FEB 2013 Session Title : Wireless Communication-1 Paper ID : 35 6/29/2016 1.

Slides:



Advertisements
Similar presentations
Trust based Dynamic MANET On-demand Routing Protocol (TDRP) Under the guidance of Dr. P. Samundiswary Asst. Professor By J Naveen Reg. No M.Tech.
Advertisements

Presented by: Dr. Khaled A. Ali Urgency-based MAC Protocol for WSBANs WiSense Seminar Series.
Improving TCP Performance over Mobile Ad Hoc Networks by Exploiting Cross- Layer Information Awareness Xin Yu Department Of Computer Science New York University,
Design and Simulation of MANET Architecture over ZigBee Protocol Suite with Layer ColaborativeEnergy aware design for Performance Optimization Rupam Das.
Topic 3: Sensor Networks and RFIDs Part 4 Instructor: Randall Berry Northwestern University MITP 491: Selected Topics.
IEEE OpComm 2006, Berlin, Germany 18. September 2006 A Study of On-Off Attack Models for Wireless Ad Hoc Networks L. Felipe Perrone Dept. of Computer Science.
Wireless Sensors and Wireless Sensor Networks (WSN) Darrell Curry.
Performance Evaluation of IEEE
Analysis of the Performance of IEEE for Medical Sensor Body Area Networking ECE 5900 Computer Engineering Seminar Instructor: Dr. Chigan Huaming.
Submission October 2011 doc.:IEEE /1517r0 Santosh Abraham, Qualcomm Incorporated Efficient Device and Service Discovery for Peer-to-Peer (P2P)
ZIGBEE PROTOCOL FOR WIRLEESS SENSOR NETWORK ZIGBEE PROTOCOL FOR WIRLEESS SENSOR NETWORK Research paper Lina kazem
Network Simulation Internet Technologies and Applications.
ZigBee. Introduction Architecture Node Types Network Topologies Traffic Modes Frame Format Applications Conclusion Topics.
ZigBee.  ZigBee is a specification for a suite of high level communication protocols used to create personal area networks built from small, low-power.
1 The Simulative Investigation of Zigbee/IEEE By, Vaddina Prakash Rao Under the Guidance of, Dipl.-Ing. Dimitri.
IEEE and Zigbee Overview. Topics ZigBee Competing Technologies Products Some Motorola Projects Slide 2Joe Dvorak, Motorola9/27/05.
Study of Transport Protocols performance in Smart Meter networks Student: Sally Advisor: Dr. Quincy Wu Date: 2012/06/30 1.
KNX – ZigBee Gateway for Home Automation
1 Intermediate report on Performance Analysis of Zigbee Wireless Personal Area Networks By, Vaddina Prakash Rao Under.
ZigBee.
Software Solutions for Product Developers Copyright 2005 Software Technologies Group, Inc. All Rights Reserved. An Overview of ZigBee The Power of the.
WiseMAC: An Ultra Low Power MAC Protocol for the Downlink of Infrastructure Wireless Sensor Networks Presented by Angel Pagan November 27, 2007 A. El-Hoiydi.
Mobile IP: Introduction Reference: “Mobile networking through Mobile IP”; Perkins, C.E.; IEEE Internet Computing, Volume: 2 Issue: 1, Jan.- Feb. 1998;
The 32nd KIPS Fall Conference 2009
Strengths and weakness for industrial applications
1 Implementation of RF4CE-based Wireless Auto Configuration Architecture for Ubiquitous Smart Home Adviser: Yih-Ran Sheu Adviser : Yih-Ran Sheu Student.
Tufts Wireless Laboratory School Of Engineering Tufts University “Network QoS Management in Cyber-Physical Systems” Nicole Ng 9/16/20151 by Feng Xia, Longhua.
Emerging Wireless Standards Understanding the Role of IEEE & ZigBee™ in AMR & Submetering Mapping Your Future: From Data to Value AMRA 2003 International.
A Distributed Scheduling Algorithm for Real-time (D-SAR) Industrial Wireless Sensor and Actuator Networks By Kiana Karimpour.
Advisor: Quincy Wu Speaker: Kuan-Ta Lu Date: Aug. 19, 2010
2008/2/191 Customizing a Geographical Routing Protocol for Wireless Sensor Networks Proceedings of the th International Conference on Information.
Jason Ernst and Mieso Denko
An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks Authors: A. Boukerche, K. El-Khatib, L. Xu, L. Korba.
Reducing Traffic Congestion in ZigBee Networks: Experimental Results th International Wireless Communications and Mobile Computing Conference (IWCMC)
Doc.: IEEE /272r0 Submission June 2001 Phil Jamieson, Philips SemiconductorsSlide 1 Project: IEEE P Working Group for Wireless Personal.
Wireless Mesh Network 指導教授:吳和庭教授、柯開維教授 報告:江昀庭 Source reference: Akyildiz, I.F. and Xudong Wang “A survey on wireless mesh networks” IEEE Communications.
A Dedicated Multi-channel MAC Protocol Design for VANET with Adaptive Broadcasting Ning Lu 1, Yusheng Ji 2, Fuqiang Liu 1, and Xinhong Wang 1 1 Dept. of.
1 Mobile ad hoc networking with a view of 4G wireless: Imperatives and challenges Myungchul Kim Tel:
Check our technology website and e-community – element14 for product data, design tools and technology information!element14 By: Lisa Taubensee TI Application.
National Institute of Science & Technology Technical Seminar Presentation-2004 Presented By: Subhasis Choudhury [EE ] ZigBee Technology By Subhasis.
IEEE WLAN.
Speaker: Yi-Lei Chang Advisor: Dr. Kai-Wei Ke 2012/05/15 IPv6-based wireless sensor network 1.
Planning and Analyzing Wireless LAN
Wrap-up Myungchul Kim Ch 5. MAC in WMNs Myungchul Kim
A Study of Secure Communications in WiFi Networks Bumjo Park 1 and Namgi Kim 11 1 Dept. Of Computer Science, Kyonggi Univ. San 94-1, Iui, Yeongtong, Suwon,
An SSCOP-based Link Layer Protocol for Wireless LANs Haoli Wang and Aravind Velayutham IEEE Global Telecommunications Conference 1-5 December, 2003 San.
ICACT 2012 Performance Study on SNMP and SIP over SCTP in Wireless Sensor Networks Advisor: Quincy Wu Speaker: Chia-Wen Lu (Sally) National Chi Nan University.
Tutorial. Month Year Copyright 2003 The ZigBee Alliance, Inc. 2 Mission Statement ZigBee Alliance members are defining global standards for reliable,
Evaluating Mobility Support in ZigBee Networks
Wireless Mesh Networks Myungchul Kim
Doc.: IEEE g Submission Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [ Supporting.
A Deafness Free MAC Protocol for Ad Hoc Networks Using Directional Antennas Jia Feng, Pinyi Ren, and Shuangcheng Yan Department of Electronic Engineering.
A Cluster Based On-demand Multi- Channel MAC Protocol for Wireless Multimedia Sensor Network Cheng Li1, Pu Wang1, Hsiao-Hwa Chen2, and Mohsen Guizani3.
Pritee Parwekar. Requirements and Standards Some requirements for WSN deployment include: –Fault tolerance –Lifetime –Scalability –Real-time data.
Lecture 41 IEEE /ZigBee Dr. Ghalib A. Shah
Patent technology for USN Jinho Son Real-Time System Lab.
Reporter: Hung-Wei Liu Advisor: Tsung-Hung Lin 1.
Introduction Wireless devices offering IP connectivity
<author>, <company>
VEHICLE TO VEHICLE COMMUNICATION USING ZIGBEE PROTOCOL
Performance analysis of an IP based protocol stack for WSNs
March 01 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: TG4 RFWaves MAC Proposal Overview Date Submitted:
Algorithms for Big Data Delivery over the Internet of Things
Introduction  An IoT is a network that connects uniquely identifiable things to the Internet.  The first word is “Internet” and the second word is “Things”.
CS526 Wireless Sensor Networks
Smart Homes Automation using Z-Wave Protocol
Master’s Thesis Proposal
Dear Dr. Chow, Dr. Kalita, and Dr. Lewis
Master’s Thesis Proposal
An Overview of Security Issues in Sensor Network
Presentation transcript:

12-CRS-0106 REVISED 8 FEB 2013 Session Title : Wireless Communication-1 Paper ID : 35 6/29/2016 1

12-CRS-0106 REVISED 8 FEB 2013 A New Approach of ZigBee MAC Layer Design Based on Security Enhancement 2 6/29/2016 Dept. of Information and Communication Technology †Dept. of Computer Science and Engineering Mawlana Bhashani Science and Technology University Santosh, Tangail-1902, Bangladesh Md. Jaminul Haque Biddut, Nazrul Islam, Rucksana Safa Sultana, Angona Sarker, Mohammad Motiur Rahman†

12-CRS-0106 REVISED 8 FEB 2013 Contents Introduction Related Work Research Objectives Methodology Design and Simulation Results and Analysis Conclusion References 3 6/29/2016

12-CRS-0106 REVISED 8 FEB 2013 Introduction 4 6/29/2016

12-CRS-0106 REVISED 8 FEB 2013 Introduction (Cont.) What is ZigBee? ZigBee is the only open, global wireless standard to provide the foundation for the Internet of Things (IoT). ZigBee is IEEE specified wireless standard Global operation frequency band 2.4 GHz Data rate 250 Kbps Three types of device : Coordinator Router End Device 5 6/29/2016 Fig. 1. ZigBee devices [1]

12-CRS-0106 REVISED 8 FEB 2013 Introduction (Cont.) 6 6/29/2016 Fig. 2. ZigBee protocol stack architecture [1]  Network Topology Tree Topology Mesh Topology Star Topology MAC Address Checking RFID Checking RFID Checking

12-CRS-0106 REVISED 8 FEB 2013 Introduction (Cont.) Features and Usages 7 6/29/2016 ZigBee provides: Comfort High Security Convenient Reliable Interoperable Wide Range of Applications: Automation Smart Network Internet of Things (IoT) Device to Device Communication (D2D) Fig. 3. World’s leading company with ZigBee [1]

12-CRS-0106 REVISED 8 FEB 2013 Related Work 8 6/29/2016

12-CRS-0106 REVISED 8 FEB 2013 Related Work (Cont.) ZigBee’s various types encryption and decryption for security issues explored in the research paper [2]. ZigBee’s MAC layer standard analyzed with other wireless standard in the paper [3]. Physical and MAC layer investigated for energy and security purposes in the article [4]. ZigBee Application security specification analyzed in the paper [5]. ZigBee MAC layer protocol design and MAC layer’s properties access analyzed in the research article [6], [7]. Moreover, RFID detection mechanism and it’s application studied in the paper [8]. 9 6/29/2016

12-CRS-0106 REVISED 8 FEB 2013 Research Objectives 10 6/29/2016

12-CRS-0106 REVISED 8 FEB 2013 Research Objectives (Cont.) To enhance security of ZigBee network To differentiate authorized and unauthorized nodes To block unauthorized ZigBee nodes To propose ZigBee new stack design To evaluate the security measures in proposed scheme 11 6/29/2016

12-CRS-0106 REVISED 8 FEB 2013 Methodology 12 6/29/2016

12-CRS-0106 REVISED 8 FEB 2013 Methodology (Cont.) 13 6/29/2016 A literature review performed to identify - The ZigBee network’s characteristics The security issues of ZigBee network ZigBee network’s protocol stack architecture Simulation Tools Selection – NS-2, NS-3, OMNET++, MATLAB investigated Riverbed Modeler v17.5 [9] selected for its real life scenarios The implementation was conducted with - ZigBee network design based on proposed stack architecture Unauthorized nodes blocking for security purpose Security Analysis and Evaluation

12-CRS-0106 REVISED 8 FEB 2013 Design and Simulation 14 6/29/2016

12-CRS-0106 REVISED 8 FEB 2013 Design and Simulation (Cont.) Proposed ZigBee Layer Enhancement: In MAC Layer, addressing and security scheme enhanced RFID detection added to Network Layer Only Authorized nodes are addressed in Application Layer Security Service Interface interact with the MAC, Network and Application Layer

12-CRS-0106 REVISED 8 FEB 2013 Proposed MAC Addressing Technique 16 6/29/2016 Fig. 3. Proposed ZigBee MAC addressing scheme

12-CRS-0106 REVISED 8 FEB 2013 Proposed ZigBee Stack Architecture 17 6/29/2016 Fig. 4. Proposed ZigBee protocol stack architecture view

12-CRS-0106 REVISED 8 FEB 2013 Simulation Process 18 6/29/2016 All the simulations carried out Riverbed Modeler version Simulation Scenario : “Security” attribute created Interfacing with security service provider Scenario Configuration Simulation Scenario configured with following parameters:

12-CRS-0106 REVISED 8 FEB 2013 ParametersDescription No. of Nodes15 No. of Coordinator1 No. of Routers2 No. of End Devices12 Authorized End DevicesNode_5, 6, 7, 9, 12, 14 Unauthorized End Devices Node_3, 4, 8, 10, 11, 13 Network Dimension300 m × 300 m Simulation Time600 sec 19 6/29/2016 Simulation Process (Cont.)

12-CRS-0106 REVISED 8 FEB 2013 Simulation Process (Cont.) 20 6/29/2016 ParametersDescription ACK StatusEnabled No. of Retransmission5 Packet SizeConstant (1024) Packet Interval TimeConstant (1,0) Packet Reception Power-0.85 Transmission Power0.05 Channel Sensing Duration0.1 Start and Stop TimeUniform (20,21), Infinity Beacon Order6 Route Discovery Timeout10 Mesh RoutingEnabled Traffic DestinationAll Routers and Coordinator

12-CRS-0106 REVISED 8 FEB 2013 Simulation Process (Cont.) 21 6/29/2016 Fig. 5. ZigBee network simulation layout

12-CRS-0106 REVISED 8 FEB 2013 Results and Analysis 22 6/29/2016

12-CRS-0106 REVISED 8 FEB 2013 Results and Analysis (Cont.) 23 6/29/2016 MAC Layer Data Traffic Reception : on average 750,000 bits per second MAC Layer Data Traffic Discard : on average 10,000 bits per second

12-CRS-0106 REVISED 8 FEB 2013 Data Packets Lost : For Unauthorized devices (node_3, 8, 10, 11, 13) On average, 36 data packets have lost for each Results and Analysis (Cont.) 24 6/29/2016

12-CRS-0106 REVISED 8 FEB 2013 Results and Analysis (Cont.) 25 6/29/2016 For Application Layer Data Drooped: Unauthorized devices (node_3, 8, 10, 11, 13) have lost one packet on its every attempt The authorized devices (node_5, 6, 7, 9, 12, 14) have got the immediate data transfer privilege

12-CRS-0106 REVISED 8 FEB 2013 Conclusion 26 6/29/2016

12-CRS-0106 REVISED 8 FEB 2013 Conclusion 27 6/29/2016 This paper present a security enhancement technique for ZigBee by modifying the MAC layer along with Network and Application layer where found : MAC layer discards on average 10,000 bits of Unauthorized nodes In Network layer, 36 data packets have lost for each Unauthorized device In Application layer, Unauthorized node’s application traffic request fully dropped

12-CRS-0106 REVISED 8 FEB 2013 Future Scope In the future investigation for: Secure multimedia communication over ZigBee networks Mobility management in large-scale ZigBee network Quality of Experience (QoE) analysis of ZigBee network 28 6/29/2016

12-CRS-0106 REVISED 8 FEB 2013 References 29 6/29/2016

12-CRS-0106 REVISED 8 FEB 2013 References 30 6/29/2016 [1] “Specification, ZigBee. ZigBee Alliance,” ZigBee.org, [Online; Accessed: 28-Jan-2015]. [2] L. N. Whitehurst, T. R. Andel, and J. T. McDonald, “Exploring Security in ZigBee Networks,” in Proceedings of the 9th Annual Cyber and Information Security Research Conference, Oak Ridge, TN, USA, April [3] R. Huang, Z. Nie, C. Duan, Y. Liu, L. Jia, and L. Wang, “Analysis and Comparison of the IEEE and Wireless Standards Based on MAC Layer,” in Health Information Science. Springer, 2015, pp. 7–16. [4] T. Kim, I. H. Kim, Y. Sun, and Z. Jin, “Physical Layer and Medium Access Control Design in Energy Efficient Sensor Networks: An Overview,” IEEE Transactions on Industrial Informatics, vol. 11, no. 1, pp. 2–15, 2015 [5] H. Li, Z. Jia, and X. Xue, “Application and Analysis of ZigBee Security Services Specification,” in 2010 Second International Conference on Networks Security Wireless Communications and Trusted Computing (NSWCTC), Wuhan, Hubei, China, April [6] M. Zhou and Z.-l. Nie, “Analysis and Design of ZigBee MAC Layers Protocol,” in 2010 International Conference on Future Information Technology and Management Engineering (FITME), Changzhou, China, October [7] P. Qi-Yong, W. Jin, W. Yi-Huai, and N. Jingfei, “A Effective Method for Properties Access in MAC Layer of ZigBee,” Communications and Network, vol. 3, no. 03, pp. 149–152, 2011.

12-CRS-0106 REVISED 8 FEB 2013 References (Cont.) 31 6/29/2016 [8] B. Nilsson, L. Bengtsson, U. Bilstrup, P.-A. Wiberg, and B. Svensson, “Towards an Energy Efficient Protocol for Active RFID,” in 2006 International Symposium on Industrial Embedded Systems (IES’06), Antibes Juan-Les-Pins, France, October [9] “Riverved,” [Online; Accessed: 15-Feb-2015].

12-CRS-0106 REVISED 8 FEB 2013 Thank You 32 6/29/2016

12-CRS-0106 REVISED 8 FEB 2013 Question and Answer 33 6/29/2016 Questions