Sei sulla pagina 1di 57

ZIGBEE

Erkan nal
CSE 401 SPECIAL TOPICS IN
COMPUTER NETWORKS
OUTLINE
ZIGBEE AND APPLICATIONS
ZIGBEE PROTOCOL
ZIGBEE ALLIANCE
ZIGBEE APPLICATIONS
IEEE 802.15.4 PROTOCOL
PHYSICAL LAYER
MAC LAYER
ZIGBEE SPECIFICATION
NETWORK LAYER
SECURITY IN ZIGBEE
ZDO AND APPLICATION SUB-LAYER


SENSOR/CONTROL NETWORK
REQUIREMENTS
Networks form by themselves, scale to large sizes and
operate for years without manual intervention
Extremely long battery life (years on AA cell),
low infrastructure cost (low device & setup costs)
low complexity and small size
Low device data rate and QoS
Standardized protocols allow multiple vendors to
interoperate

WHAT IS ZIGBEE PROTOCOL?
The IEEE 802.15.4 covers the physical layer and
the MAC layer of low-rate WPAN.

The ZigBee is an emerging standard that is
based on the IEEE 802.15.4 and adds network
construction (star networks, peer-to-peer/mesh
networks, and cluster-tree networks), application
services, and more.

ZIGBEE ALLIANCE
Organized as an independent, neutral, nonprofit
corporation in 2002
Open and global
Anyone can join and participate
Membership is global
Activity includes
Specification creation
Certification and compliance programs
Branding, market development, and user education

ZIGBEE ALLIANCE
Is a growing community of companies
~200 members vs. 35 Dec. 2002 (5+X Growth)
Includes major names in the Semiconductor, Software
Developer, End Product Manufacturer, and Service Provider
Industries including major Telecom Carriers
Has made its specification publicly available
ZigBee is open to all-ZigBee 2006 now available
38,000+ downloads to date
Has over 30 compliant platforms
Many certified vendors make choosing ZigBee a safe choice
No dominating elements or companies.
WHY ZIGBEE?
Standards based
Low cost
Can be used globally
Reliable and self healing
Supports large number of nodes
Easy to deploy
Very long battery life
Secure
The IEEE 802 Wireless Space
Data Rate (Mbps)
R
a
n
g
e

ZigBee
802.15.4
15.4c
802.15.3
802.15.3c
WPAN
WLAN
WMAN
WWAN
WiFi
802.11
0.01 0.1 1 10 100 1000
Bluetooth
802.15.1
I EEE 802.22
WiMax
I EEE 802.16
I EEE 802.20
ZigBee standard uniquely fills a gap
for low data rate applications
ZIGBEE PROMOTERS
ZIGBEE APPLICATIONS
TELECOM
SERVICES
m-commerce
info services
object interaction
(Internet of Things)
ZigBee
Wireless Control that
Simply Works

TV
VCR
DVD/CD
remote


security
HVAC
lighting control
access control
irrigation

PC &
PERIPHERALS

asset mgt
process
control
environmental
energy mgt

PERSONAL
HEALTH CARE
security
HVAC
AMR
lighting control
access control

patient
monitoring
fitness
monitoring

SOME APPLICATION PROFILES
Home Automation [HA]
Defines set of devices used
in home automation
Light switches
Thermostats
Window shade
Heating unit
etc.
SOME APPLICATION PROFILES
Industrial Plant Monitoring
Consists of device definitions
for sensors used in industrial
control
Temperature
Pressure sensors
Infrared
etc.
MORE APPLICATION PROFILES
Multiple profiles at various stages of completion
Commercial Building Automation
Building control, management, and monitoring
Telecom Services/M-commerce
Automated Meter Reading
Addresses utility meter reading
Wireless Sensor Networks
Very low power unattended networks
Vendors may form new profile groups within ZigBee
and/or propose private profiles for consideration
400+ private profile IDs issued
In-Home Patient Monitoring
Patients receive better care at reduced cost with more
freedom and comfort
Patients can remain in their own home
Monitors vital statistics and sends via internet
Doctors can adjust medication levels
Allows monitoring of elderly family member
Sense movement or usage patterns in a home
Turns lights on when they get out of bed
Notify via mobile phone when anomalies occur
Wireless panic buttons for falls or other problems
Can also be used in hospital care
Patients are allowed greater movement
Reduced staff to patient ratio
graphic
graphic
Commercial Lighting Control
Wireless lighting control
Dimmable intelligent ballasts
Light switches/sensors anywhere
Customizable lighting schemes
Quantifiable energy savings
Opportunities in residential, light
commercial and commercial
Extendable networks
Lighting network can be integrated
with and/or be used by other
building control solutions
DEFINITION OF IEEE 802.15.4
STANDARD
IEEE Std 802.15.4 defines the physical layer
(PHY) and medium access control (MAC)
sublayer specifications for low-data-rate wireless
connectivity with fixed, portable, and moving
devices with no battery or very limited battery
consumption requirements typically operating in
the personal operating space (POS) of 10 m. It is
foreseen that, depending on the application, a
longer range at a lower data rate may be an
acceptable tradeoff.
IEEE 802.15.4 DEVICE TYPES
The IEEE 802.15.4 standard (2003) defines the
device types that can be used in a LR-WPAN
which are Full Functional Device (FFD) and
Reduced Functional Device (RFD).
The RFD can be used in simple applications in
which they do not need to transmit large
amounts of data and they have to communicate
only with a specific FFD


IEEE 802.15.4 DEVICE TYPES
The FFD can work as a PAN coordinator, as a
coordinator, or as a simple device. It can
communicate with either another FFD or a
RFD.

LR-WPAN TOPOLOGIES
In keeping with the application requirements, the LR-
WPAN operates in a star or peer-to-peer topology.

The star topology the RFD communicates with a single
controller, the PAN coordinator.

The PAN coordinator can perform the same function
as the RFD, but it is also responsible for controlling the
PAN; it initiates, terminates, or routes communication
around the network


LR-WPAN TOPOLOGIES
Peer-to-peer topology supports ad-hoc mesh multi-hop
networking.

Any device in the peer-to-peer topology can communicate with
any other device within its communication range; however, this
topology also has a PAN coordinator.

All the devices in a LR-WPAN have a unique 64-bit address.
This or a short address, allocated by the PAN coordinator, can
be used inside a PAN.

Each PAN has a unique identifier. The combination of the PAN
identifier and the sort addresses allows communication across
different PANs

LR-WPAN TOPOLOGIES
Star and Peer-to-Peer topologies in LR-WPAN
PHYSICAL LAYER
The 802.15.4 standard specifies two different services
that the Physical Layer(PHY) provides.

The PHY data service controls the radio, and thus, the
transmission and reception of the PPDUs.

The management service performs Energy Detection in
the channel, Clear Channel Assesment before sending
the messages and provides LQI for the received
packets.

IEEE 802.15.4 BANDS
868/868.6 MHz for Europe
902/928 MHz for North America
2400/2483.5 MHz worldwide
PPDU PACKET FORMAT
The LSB is always transmitted and received first

The PPDU size can be up to 127 bytes

MAC LAYER
Interface between the SSCS and the PHY layer.

Similar to the PHY layer, the MAC layer supports two
services.

The MAC data service is responsible for the
transmission and reception of the MPDUs through the
PHY data service.


MAC LAYER
The MAC management service, if the device is a
coordinator, manages the network beacons. It is also
responsible for PAN association and disassociation,
frame validation, and acknowledgment providing a
reliable link between two peer MAC entities.

Uses the CSMA/CA for channel access and handles
and maintains the GTS mechanism.

Supports device security.
MAC LAYER FRAME FORMATS
The IEEE 802.15.4 standard defines four different
frame types: the beacon, data, acknowledgment, and
MAC command frame.

All frame types are based on the general MAC frame
format.

The frame control field describes and specifies the
above different frame types.

MAC LAYER FRAME FORMATS
Every MAC frame comprises a MHR, which
consists of a frame control, sequence
number, and the information field. It also
contains the MAC payload.

Different frame types have different MAC
payload fields.
GENERAL MAC LAYER FRAME
FORMAT
Each frame includes a MFR, which contains a FCS.

The data in the MPDU follows the same order as the PPDU: the
least significant bits are left in the frame and are transited first.

BEACON FRAME FORMAT
The beacon frame is transmitted periodically by the PAN coordinator.

It provides information about the network management through the
super frame and GTS fields.

It also synchronizes the network devices and indicates the proper
communication period for them.

DATA FRAME FORMAT
Encapsulates data from the higher layers.

ACKNOWLEDGEMENT FRAME
FORMAT
Does not have a payload.

When a device receives a packet, it is not obliged to
response with an acknowledgement packet

COMMAND FRAME FORMAT
Useful for communication between the network devices.

The command identifier specifies actions like association,
disassociation, and data, GTS or beacon request.

SUPER FRAME
In the LR-WPAN, every PAN has its own coordinator. The
PAN coordinator manages the communication in the local area;
it has two options, to use or not use the super frame structure.

The super frame uses network beacons.

If the coordinator does not want to use a super frame structure,
it suspends the beacon transmission.
SUPER FRAME
The beacon is important for device association
and disassociation.

If the coordinator wishes to maintain close
communication control in the PAN, and to
support low-latency devices it usually uses the
super frame.

A super frame determines a specific time period,
beacons bound it.

SUPER FRAME STRUCTURE
DATA TRANSFER TYPES
Three different types of data transfer exist.

Data transfer from a device to the PAN coordinator.

Data transfer from the PAN.

Peer-to-peer Data Transfer

The types differ if the coordinator uses or does not
beacons

DATA TRANSFER FROM A
DEVICE TO THE PAN
COORDINATOR
DATA TRANSFER FROM THE
PAN COORDINATOR
PEER-TO PEER DATA
TRANSFER
The devices are free to communicate with any other
device within their communication range.

In a peer-to-peer PAN the devices can either receive
constantly or synchronize with each other.

If they are receiving constantly, to transmit data they
use un-slotted CSMA-CA. In the second case,
synchronization must be achieved first.

SECURITY IN IEEE 802.15.4
Provides a security baseline, including the ability to
maintain an ACL and use symmetric cryptography for
data encryption.

The algorithm that is used for encryption is the AES.

The higher level layers decide when security is need.

The upper layers are in general responsible for device
authentication and key management.

ZIGBEE STANDARD
ZigBee, a new standard which became publicly
available in June 2005, is based on the IEEE
802.15.4 standard.

It expands the IEEE 802.15.4 by adding the
framework for the network construction,
security and application layer services.

ZIGBEE STACK
NETWORK LAYER
The ZigBee standard works on top of the IEEE
802.15.4 addressing schema by using the
standard 64-bit and the short 16-bit addressing.
Network layer responsibilities:
Establishment of a new network.
New device configuration, addressing assignment,
network synchronization
Frames security
Message routing.

DEVICE TYPES
Uses notion of logical devices.

ZigBee Coordinator is the first type of logical devices.

It is responsible for initializing, maintaining, and managing the network.

Under the coordinator in the network hierarchy is the ZigBee
router,

Responsible for controlling the message routing between the nodes.

ZigBee End Device acts as the end point of the network
structure.

ZIGBEE NETWORK
TOPOLOGIES
SECURITY IN ZIGBEE
Security services provided by ZigBee: key establishment, key
transport, frame protection, and device management.

The security mechanism covers the network and the application
layer.

The notion of end-to-end security is supported; the source and
destination devices have access and use the same share key.

In the MAC layer the 802.15.4 AES mechanism provides the
proper security.

SECURITY IN ZIGBEE
The mechanism protects the confidentiality, integrity, and
authenticity of the MAC frames

An auxiliary header field in front of the MAC payload indicates if
the frame is encrypted or not.

The MAC frames integrity is supported by calculating and using
a MIC at the end of the MAC payload.

Nonce is used to provide MAC confidentiality and authenticity.

SECURITY IN ZIGBEE
For different security aspects the MAC layer
uses different mode of the AES:

For the encryption it uses the AES in Counter
(CTR) mode.

For the integrity, the CBC-MAC.

Combination (CCM) of the above two modes.

SECURE MAC FRAME
NETWORK LAYER SECURITY
CCM (a modified MAC layer CCM mode) is used for
encryption.

Single key is used for all different security options.

The network layer security message format is similar to
the MAC frame.

Although the network layer is responsible for securing
its layer messages, the above layers specify the keys and
the CCM option for each frame.
SECURE NETWORK FRAME
APPLICATION LAYER
SECURITY
Uses the link key or the network key to secure the
message.

Encapsulates it inside a set of fields similar to the
network format.

Other security responsibilities that the application layer
has are to provide the ZDO and the applications with
device management services, key establishment, and key
transport

SECURE APPLICATION LAYER
FRAME
ZDO AND APPLICATION SUB-
LAYER
The ZigBee application layer contains the manufacturer-defined
application objects, the ZDO and the application sub-layer.

In addition to the security responsibilities, the application sub-
layer:
Binds devices based on their duties and needs.
Maintains the binding tables.
Forwards messages between them.
Discovers the neighbour devices for a given device.
ZDO
The ZDO is responsible for:

Determining the devices duty in the network.
Communicating using binding requests.
Supporting security

Sub-layer that implements the actual application
is the manufacturer-defined application object


CONCLUSION
Zigbee applications are in diverse areas
Zigbee Alliance works as a non-profit
organization which has more than 200
members.
IEEE 802.15.4 covers Physical Layer And Mac
Layer.
Zigbee adds network construction,application
services, and more.

Potrebbero piacerti anche