Zigbee: Erkan Ünal Cse 401 Special Topics in Computer Networks

Download as ppt, pdf, or txt
Download as ppt, pdf, or txt
You are on page 1of 57

ZIGBEE

Erkan nal CSE 401 SPECIAL TOPICS IN COMPUTER NETWORKS

OUTLINE

ZIGBEE AND APPLICATIONS

ZIGBEE PROTOCOL ZIGBEE ALLIANCE ZIGBEE APPLICATIONS PHYSICAL LAYER MAC LAYER
NETWORK LAYER SECURITY IN ZIGBEE ZDO AND APPLICATION SUB-LAYER

IEEE 802.15.4 PROTOCOL

ZIGBEE SPECIFICATION

SENSOR/CONTROL NETWORK REQUIREMENTS

Networks form by themselves, scale to large sizes and operate for years without manual intervention Extremely long battery life (years on AA cell),

low infrastructure cost (low device & setup costs) low complexity and small size

Low device data rate and QoS

Standardized protocols allow multiple vendors to interoperate

WHAT IS ZIGBEE PROTOCOL?

The IEEE 802.15.4 covers the physical layer and the MAC layer of low-rate WPAN. The ZigBee is an emerging standard that is based on the IEEE 802.15.4 and adds network construction (star networks, peer-to-peer/mesh networks, and cluster-tree networks), application services, and more.

ZIGBEE ALLIANCE

Organized as an independent, neutral, nonprofit corporation in 2002 Open and global

Anyone can join and participate Membership is global Specification creation Certification and compliance programs Branding, market development, and user education

Activity includes

ZIGBEE ALLIANCE

Is a growing community of companies

~200 members vs. 35 Dec. 2002 (5+X Growth) Includes major names in the Semiconductor, Software Developer, End Product Manufacturer, and Service Provider Industries including major Telecom Carriers
ZigBee is open to all-ZigBee 2006 now available 38,000+ downloads to date Many certified vendors make choosing ZigBee a safe choice No dominating elements or companies.

Has made its specification publicly available


Has over 30 compliant platforms


WHY ZIGBEE?

Standards based Low cost Can be used globally Reliable and self healing Supports large number of nodes Easy to deploy Very long battery life Secure

The IEEE 802 Wireless Space


WWAN IEEE 802.22

IEEE 802.20

Range

WMAN

WiMax IEEE 802.16 WiFi 802.11 802.15.3 802.15.3c

WLAN
ZigBee 802.15.4 Bluetooth 15.4c 802.15.1

WPAN

0.01

0.1

ZigBee standard uniquely fills a gap for low data rate applications

1 10 Data Rate (Mbps)

100

1000

ZIGBEE PROMOTERS

ZIGBEE APPLICATIONS
security HVAC AMR lighting control access control TV VCR DVD/CD remote

ZigBee
Wireless Control that Simply Works

patient monitoring fitness monitoring

PERSONAL HEALTH CARE TELECOM SERVICES

PC & PERIPHERALS

asset mgt process control environmental energy mgt

m-commerce info services object interaction (Internet of Things)

security HVAC lighting control access control irrigation

SOME APPLICATION PROFILES

Home Automation [HA]

Defines set of devices used in home automation

Light switches Thermostats Window shade Heating unit etc.

SOME APPLICATION PROFILES

Industrial Plant Monitoring

Consists of device definitions for sensors used in industrial control


Temperature Pressure sensors Infrared etc.

MORE APPLICATION PROFILES

Multiple profiles at various stages of completion

Commercial Building Automation

Building control, management, and monitoring

Telecom Services/M-commerce Automated Meter Reading

Addresses utility meter reading


Very low power unattended networks

Wireless Sensor Networks

Vendors may form new profile groups within ZigBee and/or propose private profiles for consideration 400+ private profile IDs issued

In-Home Patient Monitoring

Patients receive better care at reduced cost with more freedom and comfort Patients can remain in their own home Monitors vital statistics and sends via internet Doctors can adjust medication levels Allows monitoring of elderly family member Sense movement or usage patterns in a home Turns lights on when they get out of bed Notify via mobile phone when anomalies occur Wireless panic buttons for falls or other problems Can also be used in hospital care Patients are allowed greater movement Reduced staff to patient ratio

graphic

graphic

Commercial Lighting Control

Wireless lighting control Dimmable intelligent ballasts Light switches/sensors anywhere Customizable lighting schemes Quantifiable energy savings Opportunities in residential, light commercial and commercial Extendable networks Lighting network can be integrated with and/or be used by other building control solutions

DEFINITION OF IEEE 802.15.4 STANDARD

IEEE Std 802.15.4 defines the physical layer (PHY) and medium access control (MAC) sublayer specifications for low-data-rate wireless connectivity with fixed, portable, and moving devices with no battery or very limited battery consumption requirements typically operating in the personal operating space (POS) of 10 m. It is foreseen that, depending on the application, a longer range at a lower data rate may be an acceptable tradeoff.

IEEE 802.15.4 DEVICE TYPES

The IEEE 802.15.4 standard (2003) defines the device types that can be used in a LR-WPAN which are Full Functional Device (FFD) and Reduced Functional Device (RFD). The RFD can be used in simple applications in which they do not need to transmit large amounts of data and they have to communicate only with a specific FFD

IEEE 802.15.4 DEVICE TYPES

The FFD can work as a PAN coordinator, as a coordinator, or as a simple device. It can communicate with either another FFD or a RFD.

LR-WPAN TOPOLOGIES

In keeping with the application requirements, the LRWPAN operates in a star or peer-to-peer topology. The star topology the RFD communicates with a single controller, the PAN coordinator. The PAN coordinator can perform the same function as the RFD, but it is also responsible for controlling the PAN; it initiates, terminates, or routes communication around the network

LR-WPAN TOPOLOGIES

Peer-to-peer topology supports ad-hoc mesh multi-hop networking. Any device in the peer-to-peer topology can communicate with any other device within its communication range; however, this topology also has a PAN coordinator. All the devices in a LR-WPAN have a unique 64-bit address. This or a short address, allocated by the PAN coordinator, can be used inside a PAN. Each PAN has a unique identifier. The combination of the PAN identifier and the sort addresses allows communication across different PANs

LR-WPAN TOPOLOGIES

Star and Peer-to-Peer topologies in LR-WPAN

PHYSICAL LAYER

The 802.15.4 standard specifies two different services that the Physical Layer(PHY) provides. The PHY data service controls the radio, and thus, the transmission and reception of the PPDUs. The management service performs Energy Detection in the channel, Clear Channel Assesment before sending the messages and provides LQI for the received packets.

IEEE 802.15.4 BANDS


868/868.6 MHz for Europe 902/928 MHz for North America 2400/2483.5 MHz worldwide

PPDU PACKET FORMAT

The LSB is always transmitted and received first

The PPDU size can be up to 127 bytes

MAC LAYER

Interface between the SSCS and the PHY layer. Similar to the PHY layer, the MAC layer supports two services. The MAC data service is responsible for the transmission and reception of the MPDUs through the PHY data service.

MAC LAYER

The MAC management service, if the device is a coordinator, manages the network beacons. It is also responsible for PAN association and disassociation, frame validation, and acknowledgment providing a reliable link between two peer MAC entities. Uses the CSMA/CA for channel access and handles and maintains the GTS mechanism. Supports device security.

MAC LAYER FRAME FORMATS

The IEEE 802.15.4 standard defines four different frame types: the beacon, data, acknowledgment, and MAC command frame. All frame types are based on the general MAC frame format. The frame control field describes and specifies the above different frame types.

MAC LAYER FRAME FORMATS

Every MAC frame comprises a MHR, which consists of a frame control, sequence number, and the information field. It also contains the MAC payload. Different frame types have different MAC payload fields.

GENERAL MAC LAYER FRAME FORMAT

Each frame includes a MFR, which contains a FCS. The data in the MPDU follows the same order as the PPDU: the least significant bits are left in the frame and are transited first.

BEACON FRAME FORMAT

The beacon frame is transmitted periodically by the PAN coordinator. It provides information about the network management through the super frame and GTS fields. It also synchronizes the network devices and indicates the proper communication period for them.

DATA FRAME FORMAT

Encapsulates data from the higher layers.

ACKNOWLEDGEMENT FRAME FORMAT

Does not have a payload. When a device receives a packet, it is not obliged to response with an acknowledgement packet

COMMAND FRAME FORMAT

Useful for communication between the network devices.

The command identifier specifies actions like association, disassociation, and data, GTS or beacon request.

SUPER FRAME

In the LR-WPAN, every PAN has its own coordinator. The PAN coordinator manages the communication in the local area; it has two options, to use or not use the super frame structure. The super frame uses network beacons. If the coordinator does not want to use a super frame structure, it suspends the beacon transmission.

SUPER FRAME

The beacon is important for device association and disassociation. If the coordinator wishes to maintain close communication control in the PAN, and to support low-latency devices it usually uses the super frame. A super frame determines a specific time period, beacons bound it.

SUPER FRAME STRUCTURE

DATA TRANSFER TYPES


Three different types of data transfer exist. Data transfer from a device to the PAN coordinator. Data transfer from the PAN. Peer-to-peer Data Transfer

The types differ if the coordinator uses or does not beacons

DATA TRANSFER FROM A DEVICE TO THE PAN COORDINATOR

DATA TRANSFER FROM THE PAN COORDINATOR

PEER-TO PEER DATA TRANSFER

The devices are free to communicate with any other device within their communication range. In a peer-to-peer PAN the devices can either receive constantly or synchronize with each other. If they are receiving constantly, to transmit data they use un-slotted CSMA-CA. In the second case, synchronization must be achieved first.

SECURITY IN IEEE 802.15.4

Provides a security baseline, including the ability to maintain an ACL and use symmetric cryptography for data encryption. The algorithm that is used for encryption is the AES. The higher level layers decide when security is need. The upper layers are in general responsible for device authentication and key management.

ZIGBEE STANDARD

ZigBee, a new standard which became publicly available in June 2005, is based on the IEEE 802.15.4 standard. It expands the IEEE 802.15.4 by adding the framework for the network construction, security and application layer services.

ZIGBEE STACK

NETWORK LAYER

The ZigBee standard works on top of the IEEE 802.15.4 addressing schema by using the standard 64-bit and the short 16-bit addressing. Network layer responsibilities:
Establishment of a new network. New device configuration, addressing assignment, network synchronization Frames security Message routing.

DEVICE TYPES

Uses notion of logical devices. ZigBee Coordinator is the first type of logical devices.

It is responsible for initializing, maintaining, and managing the network.

Under the coordinator in the network hierarchy is the ZigBee router,

Responsible for controlling the message routing between the nodes.

ZigBee End Device acts as the end point of the network structure.

ZIGBEE NETWORK TOPOLOGIES

SECURITY IN ZIGBEE

Security services provided by ZigBee: key establishment, key transport, frame protection, and device management. The security mechanism covers the network and the application layer. The notion of end-to-end security is supported; the source and destination devices have access and use the same share key. In the MAC layer the 802.15.4 AES mechanism provides the proper security.

SECURITY IN ZIGBEE

The mechanism protects the confidentiality, integrity, and authenticity of the MAC frames An auxiliary header field in front of the MAC payload indicates if the frame is encrypted or not. The MAC frames integrity is supported by calculating and using a MIC at the end of the MAC payload. Nonce is used to provide MAC confidentiality and authenticity.

SECURITY IN ZIGBEE

For different security aspects the MAC layer uses different mode of the AES:

For the encryption it uses the AES in Counter (CTR) mode. For the integrity, the CBC-MAC. Combination (CCM) of the above two modes.

SECURE MAC FRAME

NETWORK LAYER SECURITY

CCM (a modified MAC layer CCM mode) is used for encryption. Single key is used for all different security options. The network layer security message format is similar to the MAC frame.

Although the network layer is responsible for securing its layer messages, the above layers specify the keys and the CCM option for each frame.

SECURE NETWORK FRAME

APPLICATION LAYER SECURITY

Uses the link key or the network key to secure the message. Encapsulates it inside a set of fields similar to the network format. Other security responsibilities that the application layer has are to provide the ZDO and the applications with device management services, key establishment, and key transport

SECURE APPLICATION LAYER FRAME

ZDO AND APPLICATION SUBLAYER

The ZigBee application layer contains the manufacturer-defined application objects, the ZDO and the application sub-layer. In addition to the security responsibilities, the application sublayer:

Binds devices based on their duties and needs. Maintains the binding tables. Forwards messages between them. Discovers the neighbour devices for a given device.

ZDO

The ZDO is responsible for:


Determining the devices duty in the network. Communicating using binding requests. Supporting security

Sub-layer that implements the actual application is the manufacturer-defined application object

CONCLUSION

Zigbee applications are in diverse areas Zigbee Alliance works as a non-profit organization which has more than 200 members. IEEE 802.15.4 covers Physical Layer And Mac Layer. Zigbee adds network construction,application services, and more.

You might also like