Presentation is loading. Please wait.

Presentation is loading. Please wait.

12-CRS-0106 REVISED 8 FEB 2013 Session Title : Wireless Communication-1 Paper ID : 35 6/29/2016 1.

Similar presentations


Presentation on theme: "12-CRS-0106 REVISED 8 FEB 2013 Session Title : Wireless Communication-1 Paper ID : 35 6/29/2016 1."— Presentation transcript:

1 12-CRS-0106 REVISED 8 FEB 2013 Session Title : Wireless Communication-1 Paper ID : 35 6/29/2016 1

2 12-CRS-0106 REVISED 8 FEB 2013 A New Approach of ZigBee MAC Layer Design Based on Security Enhancement 2 6/29/2016 Dept. of Information and Communication Technology †Dept. of Computer Science and Engineering Mawlana Bhashani Science and Technology University Santosh, Tangail-1902, Bangladesh Md. Jaminul Haque Biddut, Nazrul Islam, Rucksana Safa Sultana, Angona Sarker, Mohammad Motiur Rahman†

3 12-CRS-0106 REVISED 8 FEB 2013 Contents Introduction Related Work Research Objectives Methodology Design and Simulation Results and Analysis Conclusion References 3 6/29/2016

4 12-CRS-0106 REVISED 8 FEB 2013 Introduction 4 6/29/2016

5 12-CRS-0106 REVISED 8 FEB 2013 Introduction (Cont.) What is ZigBee? ZigBee is the only open, global wireless standard to provide the foundation for the Internet of Things (IoT). ZigBee is IEEE 802.15.4 specified wireless standard Global operation frequency band 2.4 GHz Data rate 250 Kbps Three types of device : Coordinator Router End Device 5 6/29/2016 Fig. 1. ZigBee devices [1]

6 12-CRS-0106 REVISED 8 FEB 2013 Introduction (Cont.) 6 6/29/2016 Fig. 2. ZigBee protocol stack architecture [1]  Network Topology Tree Topology Mesh Topology Star Topology MAC Address Checking RFID Checking RFID Checking

7 12-CRS-0106 REVISED 8 FEB 2013 Introduction (Cont.) Features and Usages 7 6/29/2016 ZigBee provides: Comfort High Security Convenient Reliable Interoperable Wide Range of Applications: Automation Smart Network Internet of Things (IoT) Device to Device Communication (D2D) Fig. 3. World’s leading company with ZigBee [1]

8 12-CRS-0106 REVISED 8 FEB 2013 Related Work 8 6/29/2016

9 12-CRS-0106 REVISED 8 FEB 2013 Related Work (Cont.) ZigBee’s various types encryption and decryption for security issues explored in the research paper [2]. ZigBee’s MAC layer standard analyzed with other wireless standard in the paper [3]. Physical and MAC layer investigated for energy and security purposes in the article [4]. ZigBee Application security specification analyzed in the paper [5]. ZigBee MAC layer protocol design and MAC layer’s properties access analyzed in the research article [6], [7]. Moreover, RFID detection mechanism and it’s application studied in the paper [8]. 9 6/29/2016

10 12-CRS-0106 REVISED 8 FEB 2013 Research Objectives 10 6/29/2016

11 12-CRS-0106 REVISED 8 FEB 2013 Research Objectives (Cont.) To enhance security of ZigBee network To differentiate authorized and unauthorized nodes To block unauthorized ZigBee nodes To propose ZigBee new stack design To evaluate the security measures in proposed scheme 11 6/29/2016

12 12-CRS-0106 REVISED 8 FEB 2013 Methodology 12 6/29/2016

13 12-CRS-0106 REVISED 8 FEB 2013 Methodology (Cont.) 13 6/29/2016 A literature review performed to identify - The ZigBee network’s characteristics The security issues of ZigBee network ZigBee network’s protocol stack architecture Simulation Tools Selection – NS-2, NS-3, OMNET++, MATLAB investigated Riverbed Modeler v17.5 [9] selected for its real life scenarios The implementation was conducted with - ZigBee network design based on proposed stack architecture Unauthorized nodes blocking for security purpose Security Analysis and Evaluation

14 12-CRS-0106 REVISED 8 FEB 2013 Design and Simulation 14 6/29/2016

15 12-CRS-0106 REVISED 8 FEB 2013 Design and Simulation (Cont.) Proposed ZigBee Layer Enhancement: In MAC Layer, addressing and security scheme enhanced RFID detection added to Network Layer Only Authorized nodes are addressed in Application Layer Security Service Interface interact with the MAC, Network and Application Layer

16 12-CRS-0106 REVISED 8 FEB 2013 Proposed MAC Addressing Technique 16 6/29/2016 Fig. 3. Proposed ZigBee MAC addressing scheme

17 12-CRS-0106 REVISED 8 FEB 2013 Proposed ZigBee Stack Architecture 17 6/29/2016 Fig. 4. Proposed ZigBee protocol stack architecture view

18 12-CRS-0106 REVISED 8 FEB 2013 Simulation Process 18 6/29/2016 All the simulations carried out Riverbed Modeler version 17.5. Simulation Scenario : “Security” attribute created Interfacing with security service provider Scenario Configuration Simulation Scenario configured with following parameters:

19 12-CRS-0106 REVISED 8 FEB 2013 ParametersDescription No. of Nodes15 No. of Coordinator1 No. of Routers2 No. of End Devices12 Authorized End DevicesNode_5, 6, 7, 9, 12, 14 Unauthorized End Devices Node_3, 4, 8, 10, 11, 13 Network Dimension300 m × 300 m Simulation Time600 sec 19 6/29/2016 Simulation Process (Cont.)

20 12-CRS-0106 REVISED 8 FEB 2013 Simulation Process (Cont.) 20 6/29/2016 ParametersDescription ACK StatusEnabled No. of Retransmission5 Packet SizeConstant (1024) Packet Interval TimeConstant (1,0) Packet Reception Power-0.85 Transmission Power0.05 Channel Sensing Duration0.1 Start and Stop TimeUniform (20,21), Infinity Beacon Order6 Route Discovery Timeout10 Mesh RoutingEnabled Traffic DestinationAll Routers and Coordinator

21 12-CRS-0106 REVISED 8 FEB 2013 Simulation Process (Cont.) 21 6/29/2016 Fig. 5. ZigBee network simulation layout

22 12-CRS-0106 REVISED 8 FEB 2013 Results and Analysis 22 6/29/2016

23 12-CRS-0106 REVISED 8 FEB 2013 Results and Analysis (Cont.) 23 6/29/2016 MAC Layer Data Traffic Reception : on average 750,000 bits per second MAC Layer Data Traffic Discard : on average 10,000 bits per second

24 12-CRS-0106 REVISED 8 FEB 2013 Data Packets Lost : For Unauthorized devices (node_3, 8, 10, 11, 13) On average, 36 data packets have lost for each Results and Analysis (Cont.) 24 6/29/2016

25 12-CRS-0106 REVISED 8 FEB 2013 Results and Analysis (Cont.) 25 6/29/2016 For Application Layer Data Drooped: Unauthorized devices (node_3, 8, 10, 11, 13) have lost one packet on its every attempt The authorized devices (node_5, 6, 7, 9, 12, 14) have got the immediate data transfer privilege

26 12-CRS-0106 REVISED 8 FEB 2013 Conclusion 26 6/29/2016

27 12-CRS-0106 REVISED 8 FEB 2013 Conclusion 27 6/29/2016 This paper present a security enhancement technique for ZigBee by modifying the MAC layer along with Network and Application layer where found : MAC layer discards on average 10,000 bits of Unauthorized nodes In Network layer, 36 data packets have lost for each Unauthorized device In Application layer, Unauthorized node’s application traffic request fully dropped

28 12-CRS-0106 REVISED 8 FEB 2013 Future Scope In the future investigation for: Secure multimedia communication over ZigBee networks Mobility management in large-scale ZigBee network Quality of Experience (QoE) analysis of ZigBee network 28 6/29/2016

29 12-CRS-0106 REVISED 8 FEB 2013 References 29 6/29/2016

30 12-CRS-0106 REVISED 8 FEB 2013 References 30 6/29/2016 [1] “Specification, ZigBee. ZigBee Alliance,” http://www. ZigBee.org, [Online; Accessed: 28-Jan-2015]. [2] L. N. Whitehurst, T. R. Andel, and J. T. McDonald, “Exploring Security in ZigBee Networks,” in Proceedings of the 9th Annual Cyber and Information Security Research Conference, Oak Ridge, TN, USA, April 2014. [3] R. Huang, Z. Nie, C. Duan, Y. Liu, L. Jia, and L. Wang, “Analysis and Comparison of the IEEE 802.15.4 and 802.15.6 Wireless Standards Based on MAC Layer,” in Health Information Science. Springer, 2015, pp. 7–16. [4] T. Kim, I. H. Kim, Y. Sun, and Z. Jin, “Physical Layer and Medium Access Control Design in Energy Efficient Sensor Networks: An Overview,” IEEE Transactions on Industrial Informatics, vol. 11, no. 1, pp. 2–15, 2015 [5] H. Li, Z. Jia, and X. Xue, “Application and Analysis of ZigBee Security Services Specification,” in 2010 Second International Conference on Networks Security Wireless Communications and Trusted Computing (NSWCTC), Wuhan, Hubei, China, April 2010. [6] M. Zhou and Z.-l. Nie, “Analysis and Design of ZigBee MAC Layers Protocol,” in 2010 International Conference on Future Information Technology and Management Engineering (FITME), Changzhou, China, October 2010. [7] P. Qi-Yong, W. Jin, W. Yi-Huai, and N. Jingfei, “A Effective Method for Properties Access in MAC Layer of ZigBee,” Communications and Network, vol. 3, no. 03, pp. 149–152, 2011.

31 12-CRS-0106 REVISED 8 FEB 2013 References (Cont.) 31 6/29/2016 [8] B. Nilsson, L. Bengtsson, U. Bilstrup, P.-A. Wiberg, and B. Svensson, “Towards an Energy Efficient Protocol for Active RFID,” in 2006 International Symposium on Industrial Embedded Systems (IES’06), Antibes Juan-Les-Pins, France, October 2006. [9] “Riverved,” http://www.riverbed.com/, [Online; Accessed: 15-Feb-2015].

32 12-CRS-0106 REVISED 8 FEB 2013 Thank You 32 6/29/2016

33 12-CRS-0106 REVISED 8 FEB 2013 Question and Answer 33 6/29/2016 Questions


Download ppt "12-CRS-0106 REVISED 8 FEB 2013 Session Title : Wireless Communication-1 Paper ID : 35 6/29/2016 1."

Similar presentations


Ads by Google