Keywords: ZIGBEE, WPAN, SENSOR NETWORKS, WIRELESS, POWER, TOPOLOGY, SECURITY

Volume 4, Issue 2, February 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Pa...
0 downloads 1 Views 539KB Size
Volume 4, Issue 2, February 2014

ISSN: 2277 128X

International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Special Issue: Advanced Developments in Engineering and Technology Conference Held in Lord Krishna College of Engineering Ghaziabad, India

An Overview of Wireless Sensor Networks Using Zigbee Technology Sunil Ghildiyal, Amit Kumar Mishra, Neha Garg Uttranchal University, Dehradun India Abstract: ZigBee is a standard suite of high level protocols designed for reliable wireless networked monitoring and control. It is an IEEE 802.15.4 standard for low cost, low data rate wireless networks includes features like scalability, self-organizing, self-healing. ZigBee is an advanced technology uses low data rate, low power radios for designing and implementation of PAN. The ZigBee aims simpler and low costing, low power devices with low data rate to form a wireless network. The tiny devices, also called nodes, used in such networks are economical and deployed widely in controlling and monitoring applications. Less data rate features of ZigBee results in low power consumption and makes it useful in wireless sensor networks, increasing life of small batteries of nodes in the network. ZigBee is best suited for the applications where data is either periodic or intermittent. It is an open standard protocol with no licensing fees or negligible fee. A number of sources and vendors provide chipsets and hardware, to be used for designing, implementing low power based fully wireless mesh networks having very less maintenance with high security. Some examples of application of ZigBee based solutions are military security, environment monitoring and home automation. This paper aims at reporting an initial introduction of WSN, subsequently overview of ZigBee technology, characteristics, architecture and security. ZigBee suite development was started in 1998 and has been revised in 2006. The term ‘ZigBee’ is motivated from the dancing of bees, their zigzag manner movements but communicating with each other for coordination. Keywords: ZIGBEE, WPAN, SENSOR NETWORKS, WIRELESS, POWER, TOPOLOGY, SECURITY I. INTRODUCTION Wireless Sensor networks (WSN) is an emerging technology that shows result oriented promise for futuristic applications for mass public as well as defence[1].WSN consists of low power, low cost smart devices which have limited computing resources[2]. Wireless Sensor Networks (WSNs) have gained worldwide attention in recent years, particularly with the proliferation in Micro-Electro-Mechanical Systems (MEMS) technology which has facilitated the development of smart sensors[3]. Rapidly increasing demand and interest in wireless sensor networks can be interpreted by knowing about what exactly they essentially are and how these can be utilized in different areas of real-life applications. These are a large number of tiny sensing self powered nodes which collect the information as they are configures to detect specific incidents and to transmit in a wireless fashion. Ultimate aim is to interpret, observe and handle the WSN node data at base station. WSNs form an ad-hoc network that operate with nominal or no infrastructure. WSNs merge a wide range of information technology that spans computer hardware, systems software, networking and programming methodologies. WSNs make it possible to perceive what takes place in the physical world in ways not previously possible[4]. ZigBee is a specification that defines a set of high level protocols for low cost and low power Wireless Personal Area Networks (WPANs). It does not require infrastructure (no need for access point) or when it does, it is usually pretty simple. It is employed principally for monitoring or control tasks which require low cost, reliability, security and low power consumption (long battery life) where high range or high rate communication is not needed. ZigBee is specified by a consortium of manufacturers, distributors and users called ZigBee Alliance which is also a trademark property of Philips Corporation [5]. ZigBee is based upon the IEEE Std 802.15.4 which, in turn, is a standard that defines the low level protocols that intends to guarantee connectivity among portable, low cost, low complexity and low power devices. The IEEE 802.15.4 defines the Physical and the Media Access Control (MAC) layers. ZigBee adds over IEEE 802.15.4 the definition of protocols for the Network and the Application layers. ZigBee is a standard for wireless personal area networking (WPAN), connections based on digital radios between the network components like computer, devices. Low rate of ZigBee accommodated low data rate devices, consuming less energy and thus characterized by long battery life[6]. ZigBee promises an application area where components can communicate with each other or with the internet, controlled and monitored by a single unit. ZigBee based infrastructure claims data rate of 250 Kbit/s. It is best applicable for the application where data capturing and transmission is periodic or irregular. It is low power, wireless sensor network technology based, includes dense deployment of tiny sensors over the application area. It operates in industrial, scientific and Medical (ISM) radio bands under IEEE 802.15.4[7]. ZigBee © 2014, Lord Krishna College of Engineering Ghaziabad, India

Page | 111

Sunil et al., International Journal of Advanced Research in Computer Science and Software Engineering 4(2), February- 2014, pp. 111-116 defines the network and application layers above 802.15.4 and are promoted by ZigBee Alliance [8]. Its main contribution is giving mesh network capabilities to 802.15.4 applications [9]. ZigBee Alliance also publishes regulations and standards, followed by multiple OEM vendors to create ZigBee based interoperable products. The relationship between IEEE 802.15.4 and ZigBee is same as that between 802.11 wirelesses and the WECA-Wi-Fi. ZigBee specification is free to use by public for non-commercial purposes. ZigBee is the global suite of communication protocol formulated by the relevant task force under the IEEE 802.15 working group. II. NEED FOR ZIGBEE a) Many standards may address moderate to high data transfer rates for LAN and other applications, however there is no any wireless standard that fulfills the need of low energy based sensors and controlling components. Wireless sensors controlling mechanism does not require large bandwidth channel. But there is low latency and low battery exhaustion requirements in such devices [10]. b) Many real world problem solving applications don’t need high bandwidth for data transfer but demand low cost of entire solution. c) Developed proprietary OEM solutions for wireless networks generally not included such standards cause of nonavailability of such hardware software specifications. So there was always a huge demand of interoperability between the solutions either applications or hardware. Even protocols for such applications and hardware were also not available and demanded thirstily. III. ZIGBEE CHARACTERISTICS ZigBee standard includes the characteristics like less power requirement, moderate to very high deployment density, economical and simple implementation. Followings are the characteristics of ZigBee: • Dual PHY modes. It represents three license-free bands: 2.4-2.4835 GHz, 868-870 MHz and 902-928 MHz, best optimized for low duty-cycle components like sensor, controlling devices. • Low power requirement: ZigBee standard ensures the achievement of longer power life by either of two means: continuous network connection and slow but sure battery drain, or intermittent connection and even slower battery drain. • Low latency and high throughput • Channel access using Carrier Sense Multiple Access with Collision Avoidance (CSMA - CA) • Addressing space of up to 64 bit IEEE address. • 40-50m typical range • Different implementation topologies like star, peer-to-peer, mesh IV. ZIGBEE APPLICATIONS Following areas have been opened for ZigBee implementations: Home Control: Controlling lights, temperature and ventilation of home. Also managing security of home. Industrial Control: Asset management, Process control, Energy management Health Care: Body fitness monitoring and patient care. Building Automation: Implementing and controlling the Security and Lighting control Environment: Environment monitoring Computer and peripherals: keyboard, Mouse IV A. ZIGBEE OVER IEEE 802.15.4 ZigBee defines standard for low rate WPAN (LR-WPAN) to support the devices that require minimal energy and to be operated in the personal operating space (POS) of about 10-12m. ZigBee infrastructure includes self-organization, multihopping and a promising mesh network with long energy for nodes. [11-12]. There are two types of devices which can be a part of a typical LR-WPAN network: a full-function device (FFD) and a reduced-function device (RFD). FFD can act as a PAN coordinator, a coordinator, or device. FFD can communicate with RFDs or other FFDs, while an RFD can have a communication with FFD only. RFD is designed for very simple application which doesn’t need to send a huge © 2014, Lord Krishna College of Engineering Ghaziabad, India

Page | 112

Sunil et al., International Journal of Advanced Research in Computer Science and Software Engineering 4(2), February- 2014, pp. 111-116 amount of data. Generally a RFD may get associated with only one FFD in a particular time. RFD can be implemented with minimal resources and memory requirements. FFD may decide it to be a PAN coordinator after activation, first time or it may further establish its own network on later. Such many star connected networks operate independently from other networks for any operation.. Once the PAN identifier is chosen, which is not used by any other, the PAN coordinator can allow the devices to join it in network. Any of the FFDs may act as a coordinator and facilitate synchronization services to other devices or coordinators. Only such coordinators may become overall PAN coordinator. It generally has much powerful resources then any other device in the infrastructure. V. DEVICE TYPES ZigBee Coordinator (ZC): It is most capable device, forms the root of the network tree. It might bridge to another other networks. In ZigBee infrastructure, there is one ZigBee Coordinator and it is the device that initialized and started the network. ZC records the information of the network, its Trust Center and location, distribution of security keys. ZigBee Router (ZR): It can work as intermediary device for passing the information. It may also run the specific application needed for routing functionality. ZigBee End Device (ZED): It is the device in the network requires least energy, memory capabilities and is significantly cheaper than ZC or ZR. These have a long battery life and can not relay the data of other devices. VA. DEVICE ROLES In an IEEE 802.15.4 network, an FFD device can take three different roles: Coordinator, PAN coordinator and device. A coordinator is an FFD device that is capable of relaying messages. If the coordinator is also the principal controller of a personal area network (PAN), it is called a PAN coordinator. If a device is not acting as a coordinator, it is simply called a device. The ZigBee standard uses slightly different terminology: A ZigBee coordinator is an IEEE 802.15.4 PAN coordinator. A ZigBee router is a device that can act as an IEEE 802.15.4 coordinator. Finally, a ZigBee end device is a device that is neither a coordinator nor a router. A ZigBee end device has the least memory size and fewest processing capabilities and features. An end device is normally the least expensive device in the network. RFDs can not relay the messages. However, an RFD can communicate only with one particular device like coordinator or router in the network VI. ZIIGBEE TRAFFIC TYPES ZigBee/IEEE 802.15.4 addresses three types of data traffic: periodic data, intermittent data and repetitive data. Periodic data is captured by a activated sensor, when an incident is detected. After capturing the data sensor is deactivated. In case of intermittent data, application uses minimum energy consuming sensor, communication is done only when a specific data rate is observed. When data is repetitive, device operates for fixed durations on the basis of GTS (guarantee time slots). ZigBee has two modes of operation: beacon or non-beacon. These modes enable the to-and-fro data traffic. When coordinator is powered by batteries, beacon mode is applicable while non-beacon mode is applied on coordinator having main power. VII. ADVANTAGES OF ZIGBEE ZigBee is designed to facilitate following features in the network: 1) Easy configuration. ZIGBEE has a capability of configuring and realizing most of short-distance wireless functions. Its application suite widely shortens development period of real world solutions. For example ZIGBEE can be used in home automation, smart grid and remote control, etc. 2) Low energy consumption and simple implementation. Devices are configured to toggle between active and passive mode as per demand of applications. Devices are designed to sense the desired information and to forward the same to further or to the internet. When any such information is not found for a time period, nodded become passive for that period, saving energy. © 2014, Lord Krishna College of Engineering Ghaziabad, India

Page | 113

Sunil et al., International Journal of Advanced Research in Computer Science and Software Engineering 4(2), February- 2014, pp. 111-116 3) Battery life of such sensor is varying long: many months to years. It is remarkable feature of nodes of ZigBee based infrastructure. For examples, a typical home application may require the battery replacement after many months. 4) Low cost (device, installation, maintenance): Users may adopt ZigBee technology in their solutions easily due to its low cost, low energy devices. These devices are easy to install, very less maintenance regular or preventive maintenance demanding. Battery of such devices is to last up to years using primary cells without any chargers. ZigBee’s simplicity allows for configuration inheritance and fault tolerance to the network with minimal maintenance overhead. 5) Higher Deployment Density: Over an area, nodes can be deployed very densely, increasing a very strong mesh network to support fault tolerance. Numbers of arrays can be created to control the entire infrastructure. VII A. DISADVANTAGES OF ZIGBEE 1. It is costlier to replace with ZigBee compliant appliances in some applications. As non-ZigBee radios are not supported in ZigBee infrastructure. 2. It can not be predicted as more secure then a typical 802.11wireless network. 3. For ZigBee compatible appliance manufacturers, it is mandatory to use lithium battery. 4. ZigBee compliant manufacturers are still very slow to develop the standards as per market demand. VIII. ZIGBEE IMPLEMENTATION In ZigBee implementation, every Each ZigBee device is assigned to a specific profile either public or private. Profiles are the combination of the environment of the application, device type and clustering is used for communication between them. There is a guarantee of the interoperability between different suppliers for a particular application space[13]. An application object, ZigBee is associated with an endpoint. These endpoints are to be used to define a ZigBee device. Application objects are governed by application layer for different functionalities. ZigBee Device Object (ZDO) is associated with end point 0 and is used for the management and installation of all the devise in the ZigBee infrastructure. By the help of ZDO lower layers can access their configuration and initialization. Endpoint 255 is also reserved and used to broadcast to all endpoints. Cluster are the data structures, used for communication between endpoints. These clusters are shared variables in the network. ZigBee profile defines the cluster. Binding is done for establishing the interaction link between incoming and outgoing cluster. Binding can be either directly when the destination address is known or via PAN coordinator when not known.. IX. RELIABILITY AND SECURITY Reliability means assurance of data to be reached to the destination without any corruption. This corruption may occur from any interference radio interference in case of ZigBee, poor transmission links or poor receiving situations. Reliability measures that how wireless network operates in protected environment along with nearby operated wireless networks even on same frequency band. Listen before Send technique used in ZigBee avoids transmitting data when channel is not free or clear to send. It is also called as Carrier Sense, Multiple Access with Collision Avoidance (CSMA-CA). Acknowledgement is another method to ensure reliability where all sent data is acknowledged by acknowledgement by the receiver. Sender checks for acknowledgements for the data it sent. In case of non-receipt of acknowledgement of any data, it is to be re transmitted. This mechanism is built into ZigBee to make sure that data must reach to the destination. Alternative Routes is also a method which results in discovery of alternate path if selected or pre determined path is not available or busy some how. It is highly applicable in mesh topology where more than one path from source to destination is available[14]. ZigBee networks are very secure in general. They incorporate preventive measures to prevent intrusion to the infrastructure. First mechanism in ZigBee security is based on a 128-bit AES algorithm, adds to the security model provided by IEEE 802.15.4. The encryption algorithm used is AES (Advanced Encryption Standard) with a 128bkey length (16 Bytes). While considering any cryptographic algorithm for ZigBee, its specific hardware and design constraints must also be considered. AES encrypts the data and validates also. It is called Data Integrity and it is by the virtue of applying Message Integrity Code (MIC) also called as Message Authentication Code (MAC). MAC is appended to the message. MAC code guarantees the integrity of the MAC header and payload data attached[15]. Since AES is very strongly structured, high-secured, encryption algorithm for prevention from intruders, ZigBee has adopted this algorithm in its security mechanism. Message timeout is also an effective method in ZigBee to discard the messages which are not as per time order or timed-out. Rejection of timed-out message may prevent from replay attacks. Frame counter is mechanism , applied to the message which is mark of age of message that how old message is. ZigBee uses ACL, maintained in the node, which has alist of MAC access control information. X. CONCLUSION ZigBee infrastructure includes the tiny low powered devices which may operate for several years before their batteries are exhausted. ZigBee suite supports multiple topologies and it is standard developed by the ZigBee Alliance, having a many member companies, from the embedded hardware industry, software developers to original equipment manufacturers (OEMs). This paper describes the initial details, features of WSN and ZigBee standard. However IEEE 802.11, 802.15 standards are available in market for wireless network solutions but their higher cost, high power © 2014, Lord Krishna College of Engineering Ghaziabad, India

Page | 114

Sunil et al., International Journal of Advanced Research in Computer Science and Software Engineering 4(2), February- 2014, pp. 111-116 requirements debar them to be utilized at mass level as ZigBee, especially in unattended environment conditions. ZigBee seems to be an effective solution of low power wireless networks where not too much continuous data stream is to be captured and transferred at very high data rate, resulting in battery exhaustion rapidly. Many applications really need such sensor nodes based networks over ZigBee. Ultimate goal of these applications is to deploy the variety of sensors in geographically critical areas generally and then utilize these heterogeneous sensors to capture different physical parameters as desired by their configuration at a specific predetermined trigger time and rate and to forward the data to further network or internet. Such application may not require continuous streaming of data necessarily and hence comfortable with low power source for a long period till power lasts. Multiple hardware and software OEM standards have been already been built and many are in process of development to meet with requirement of such ZigBee based wireless sensor networks. It is very obvious that ZigBee will play a global role in upcoming wireless networks and communication technology. Since ZigBee is designed for real world applications which require less processing at low power requirements by the deployment of tiny sensors and control, resulting in small data packets and less processing overheads. ZigBee Alliance aims a huge crowd of ISM applications of its nature. It would certainly suit to the applications where deployment of heterogeneous sensors at low power and data rate, will solve the real world problems. REFERENCES [1] Al-Sakib Khan Pathan, Hyung-Woo Lee and Choong Seon Hong “Security in Wireless sensor Networks: Issues and Challenges” ISBN 89-5519-129-4 Feb 22-22, 2006 ICACT2006 [2] Ritu sharma, Yogesh Chaba and Y.Singh “Ánalysis of Security Protocols in Wireless Sensor Network” International Journal Avanced Networking and Applications Volume 02, issue 03, pages:707- 713(2010) [3] Neelam Srivastava “Challenges of Next-Generation Wireless Sensor Networks and its impact on Society” JOURNAL OF TELECOMMUNICATIONS, VOLUME 1, ISSUE 1, FEB 2010 128 [4] Satvika Khanna, Ms. Priyanka Singh, Akhil Kaushik “Wireless Sensor Network: Issues & Challenges” IJMA Vol 2, No 11, 2011 [5] Javier García Castaño “ Algorithms and Protocols Enhancing Mobility Support for Wireless Sensor Networks Based on Bluetooth and ZigBee, Mälardalen University Press, Västerås (Sweden), September 2006, ISBN: 91- 85485-21-7, pp. 9-45 [6] Dr. S.S.R. Ahamed “ The role of Zigbee technology in future data communication system” Journal of theoretical and applied Information Technology, JATIT 2005-2009. [7] K. Nirmal Kumar, R Prapakaran “Zigbee Wireless Sensor Network Technology Study for Paddy crop Field Monitoring” ICVCI 2011 (IJCA) [8] Alliance, Z. Zigbee Specifications. Zigbee Standard Organizations, San Ramon, CA, USA 2008 [9] Chiara Buratti, Andrea Conti, Davide Dardari and Roberto Verdone “An Overview on Wireless Sensor Networks Technology and Evolution” Sensor9 ISSN1424-8220 [10]William Stalling, ―Wireless Communication and Networks, Fourth Edition, Pearson Publication Limited, 2004, Pp 39-118. [11] J. S. Lee, “Performance evaluation of IEEE 802.15.4 for low-rate wireless personal area networks,” IEEE Trans Consumer Electron. vol. 52, no. 3, Aug. 2006. [12 J. S. Lee and Y. C. Huang, “ITRI ZBnode: A ZigBee/IEEE 802.15.4 platform for wireless sensor networks,” in Proc.IEEE Int. Conf. Systems, Man & Cybernetics, Taiwan, Oct. 2006, [13] Rogelio Reyna Garcia, “Understanding the ZigBee Stack”, EE Times Asia, January 2006 [14] http://www.jennic.com/elearning/zigbee/files/tml/module5 [15] Rui Silva, Serafim Nunes “Security Issues on ZigBee” INESC-ID, ESTIG, IST Coimbra, 22 de Julho de 2005 Author’s Profile:

Sunil Ghildiyal is Assistant Professor in Uttaranchal University, Dehradun. He has done M.Tech from Graphic Era University. He specializes in core areas of computer science and holds experience of more than 10 years. He is an innovative person with deep knowledge of Computer Networks, Mobile Computing, Unix and System Administration. His research interest includes Wireless Sensor Networks and Information Security.

Amit kumar Mishra is Assistant Professor in Uttaranchal University, Dehradun. He has done his M.Tech from Uttarakhand Technical University. He specializes in core areas of computer science and holds experience of more than 6 years. He is an innovative person with deep knowledge of Object Oriented Programming, Software Engineering, Database Management System, and C Programming.

© 2014, Lord Krishna College of Engineering Ghaziabad, India

Page | 115

Sunil et al., International Journal of Advanced Research in Computer Science and Software Engineering 4(2), February- 2014, pp. 111-116 Neha Garg is Associate Professor in Department of Information technology, Graphic Era University, Dehradun. She has done M.Teh.(CSE). Her research interests include Software Engineering, Computer Networks, Wireless Networks, Information Security and Data Mining. She has a successful career in teaching with 8+ years of experience. She also have numerous research papers in reputed journals and conferences.

© 2014, Lord Krishna College of Engineering Ghaziabad, India

Page | 116