Third Year Seminar Report
Zigb ee
by
Ruchita Jadhav
T.E. Roll No.: 33 Year: (2009-2010)
Guide
Prof .Mrs.P.D.Bhamre
Co-Guide
Prof. V.S.Bharambe
Department of Information Technology
K.K.Wagh Institute of EngineeringEducationand R esearch
Nashik -422003
Abstract
Zigbe e is a new Wirelesssensornetwork technology characteristic of le ss distance and low
speed. It can be used in som e special situation for signal collection, processingand trans-
mitting.ZigBee is a technology now being deployed for wireless sensor networks. A
sensornetwork is an infrastructure comprised of sensing, computing and communications
elem ents that allows the administrator to instrument, observe and react to events and
phenomenain a specified environment.Typical applications include, but are not limited to,
data collection, monitoring, surveillance and medical telemetry.
ZigBee is the set of specifications built around the IEEE 802.15.4 wireless protocol.
ZigBee technology is a low data rate, low power consumption, low cost, wirelessnetworking
protocol targeted towards automation and remote control applications
ZigBeeis a communication protocol that use ssmall, low-power digital radio signalsbased
on the IEEE 802.15.4standard.ZigBeeoperate s in
ISM radio bands: In USA 915 MHz, in Europe 868 MHz and 2.4 GHz in other parts of
the globe. In the 2.4 GHz band there are 16 ZigBee channels,with each channel requiring 2
MHz of bandwidth.
The most capable ZigBee node type is said to require only about 10typical
Bluetooth or Wireless Internet node, while the simplest nodes are about 2However, actual
code sizesare much higher, closer to 50transmission range of Zigbe e is over 50 meters
and speed is
20-250KB/s, it needsonly 32K of system resources.It is simple, effective and cheaper than
other WPANs like bluetooth, WiFi. ZigBee solve s the needs of remote monitoring and
control, and sensornetwork applications. It take s full advantage of a powerful physical radio
specified by IEEE802.15.4,adding logical network, security and application software to the
specification.
Contents
1 Intro duction 1
1.1 What is Zigbe e ? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
1.2 Origin of word Zigbe e . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
1.3 Zigbe e Alliance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
1.4 Need of Zigbe e . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
1.5 Wirelesssensornetworking is one of the most exciting technology markets today 2
1.6 U ses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
1.7 Software and hardware . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
2 Proto col stack for Zigb ee 6
2.1 PHYSICAL layer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
2.1.1 Features of PHY layer: . . . . . . . . . . . . . . . . . . . . . . . . . . 7
2.2 MAC layer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
2.2.1 Different mac layer devices . . . . . . . . . . . . . . . . . . . . . . . . 7
2.3 Network Layer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
2.3.1 Network layer topologies . . . . . . . . . . . . . . . . . . . . . . . . . 9
2.3.2 Mesh topology in Zigbe e . . . . . . . . . . . . . . . . . . . . . . . . . 9
2.4 Benefits of Mesh topology . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
2.5 Limitations of Mesh topology . . . . . . . . . . . . . . . . . . . . . . . . . . 10
2.6 The power of Mesh Topology . . . . . . . . . . . . . . . . . . . . . . . . . . 10
2.7 Cluster tree topology in Zigbe e . . . . . . . . . . . . . . . . . . . . . . . . . 10
2.8 Star topology in Zigbe e . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
2.9 Benefits of Star topology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
2.10 limitation of Star topology . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
2.11 Application layer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
2.12 Reliable ZigBee Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
2.13 Security in Zigbe e . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
2.13.1 Trust center . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
2.13.2 Security keys . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
2.13.3 Master keys . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
2.13.4 Network keys . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
2.13.5 Link keys . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
ii
2.14 Security mod es . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
2.14.1 Standard security mode . . . . . . . . . . . . . . . . . . . . . . . . . 14
2.14.2 High security mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
2.14.3 Differencebetween Zigbe e and Bluetooth . . . . . . . . . . . . . . . . 14
3 Zigb ee - Protocol,Devices and Applications 16
3.1 Protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
3.2 What ZigBee’s”Low Power Consumption” Means . . . . . . . . . . . . . . 16
3.3 Type s . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
3.4 Advantages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
3.5 Disadvantag e s . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
3.6 Applications of Zigbe e . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
4 Conclusion 19
iii
List of Figures
2.1 Zigbe e protocol stack . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
2.2 Mac layer a ssociation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
2.3 Mesh Topology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
2.4 Star Topology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
2.5 Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
iv
List of Tables
2.1 Differencebetwee n Bluetooth and Zigbe e . . . . . . . . . . . . . . . . . . . . 15
v
Chapter 1
Intro duction
1.1 What is Zigb ee?
Zigbe e is a Technological Standard Created for Control and SensorNetworks based on the
IEEE 802.15.4specification for wirelesspersonal area network .It is a New wirelesstechnology
that has application in various fields.Zigbe e benfits are low cost and Range and obstruction
issuesavoidance.Themain featuresof this standard are network flexibili ty, low cost, very low
power consumption,and low data rate in an adhoc self-organizingnetwork among inexpensive
fixed, portable and moving devices.
1.2 Origin of word Zigb ee
The erratic, zig-zagging patterns of be e s betwee n flowers while collecting pollens from
the flowers Symbolizes communication betwee n nodes in a m esh network of Zigbe e
network.The network components are analogousto queen be e , drones,worker be e s.
Proc e s son ZigBee-style networks began in 1998, when many engineers realized that both
WiFi and Bluetooth were going to be unsuitable for many applications. In particular, a need
for self-organizingad-hoc digital radio networks arose.
ZigBee is very low cost, low power consumption, two ways, wirelesscommunication pro-
tocol. It adopts IEEE 802.15.4, as its lower protocol layers: the physical layer (PHY) and
medium AccessControl (MAC) portion of data link layer (DLL) take s care of network, secu-
rity and upper application issues. The relative organization of the IEEE radio with respect
to the ZigBee functionality. Wireless systemsmostly use cell phone-style radio links, using
point-to-point or point-to- multip oint transmission. These traditional wirelessformats have
drawbacks like rigid structure, signal dropping and meticulous planning requirements.
1.3 Zigb ee Alliance
It is a ssociation of companiesworking together to enable reliable ,cost effective, low power
,wirelessly networked ,monitoring and control products based on an open global standard.
1.4 Need of Zigb ee
ZigBee was created to satisfy the market’s nee d of a standards-basedwirelessnetwork that
is cost-effective,supports low data rates,low power consumption,secureand reliable.
Why ZigBee? Let us compareit to its closestcompetitor, Bluetooth. If we want to build
a remote battery powered Bluetooth node, we nee d at least 250K of memory for the
code and stack, and transmission speed of 720KB/s up to range of approximately 10
meters , if there are no cordless phones, VCRs etc around. The battery life will be 7
days. Now, comparethat to
ZigBee. Though it is a lower-speed wireless protocol that’s targeted at transmission
spe ed s of 20-250KB/s, it has a transmission range of over 50 meters. Battery life is 2 years
and 32K of system resourcesis required. This is simple, effective, and very practica
ZigBee is the only wireless standards-basedtechnology that addressesthe unique needs
of remote monitoring control, and sensorynetwork applications,enables broad-baseddeploy-
ment of wirelessnetworks with low cost, low power solutions.
1.5 Wireless sensor networking is one of the most
ex- citing technology mar kets today
[4]. They say that over the next five to ten years, wireless sensors will have a
significant impact on almost all major industries a s well as our home live s . Broadly,
this technology market includes application segm ents such as automated meter reading,
home automation, building automation, container security/tra cking, and many others.
Although products that span these application segm ents are diverse and different in how
they operate and what they do, their requirements from a wirelesscommunication technology
are very similar. For example, these applications generally require low data rates and
are battery powered.
The main motivations for migrating the s eproducts to wirelesscommunications are three-
fold:
1. Installation cost - The cost of running wires in a typical building automation project
in an existing facility can be as high a s 80project cost [4]. 2. Maintenance - It is easier to
configurea hot-water heater controller with a hand-held remote than a keypad in the closet.
3. New markets - Eliminating the wire ope ns new markets that were previously unavailable
to wired products.
Zigbe e [3, 5] wa s introduced as an alternative to Bluetooth for devices with low
power consumption requirem ents and applications of lower bit rates. Although products
based on the Bluetooth standard are often capable of operating at greater distances,
the targeted operational area is the one around an individual, (e.g. within a 10 meters
diameter). Blue- tooth utilizes a short range radio link that operates in the 2.4 GHz
industrial scientific and medical (ISM) band similar to WLAN. However, the radio link
in Bluetooth is based on frequency hop spread spectrum. Although at any point in
time, the Bluetooth signal oc- cupies only 1MHz, the signal changesthe center frequency
(or hops) deterministically at a rate of 1600Hz. Bluetooth hops over 79 center frequencies,
so over time the Bluetooth signal actually occupies 79MHz. The new short range, low
power, low rate wireless networking protocol, Zigbe e , complements the high data rate
technologiessuch a s WLAN and open the door for many new applications. This standard
operates at three bands, the 2.4 GHz band with a maximum rate of 250 kbps, the 915 MHz
band with a data rate of 40 kbps, and the
868 MHz band with a data rate of 20 kbps. While Bluetooth devices are better suited for
fairly high rate sensorand voice applications, Zigbe e is better suited for low rate sensorsand
devicesused for control applications that do not require high data rate but must have long
battery life, low user interventions and mobile topology. Som e of these applications are in
the fields of medicine
ZigBee is a low-cost, low-power, wirelessm esh networking proprietary standard. The low
cost allows the technology to be widely deployed in wirelesscontrol and monitoring applica-
tions, the low power-usageallows longer life with smaller batteries, and the mesh networking
provides high reliabili ty and larger range. The ZigBee Alliance, the standards body
that defines ZigBee,[1] also publishes application profiles that allow multiple OEM
vendors to create interoperable products. The current list of application profiles either
published or in the works are: Home Automation ZigBee Smart Energy 1.0/2.0
Commercial Building Automation Telecommunication Applications Personal, Home, and
Hospital Care Toys
The relationship betwee n IEEE 802.15.4 and ZigBee is similar to that between IEEE
802.11 and the Wi-Fi Alliance. The ZigBee 1.0 specification wa s ratified on 14
December
2004 and is available to members of the ZigBee Alliance. Most recently, the ZigBee
2007specification wa s posted on 30 October 2007. The first ZigBee Application Profile,
Home Automation, wa s announced 2 November 2007. As amended by NIST, the
Smart Energy Profile 2.0 specification will remove the dependency on IEEE 802.15.4.
Device manufactur- ers will be able to implement any MAC/PHY, such a s IEEE
802.15.4(x)and IEEE P1901,under an IP layer basedon 6LowPAN.
ZigBee operates in the industrial, scientific and medical (ISM) radio bands; 868 MHz in
Europe, 915 MHz in the USA and Australia, and 2.4 GHz in most jurisdictions worldwide.
The technology is intended to be simpler and le ss expensive than other WPANs such
a s Bluetooth. ZigBee chip vendors typically sell integrated radios and microcontrollers
with betwee n 60K and 128K flash memory, such a s the Jennic JN5148, the Freescale
MC13213,
the Ember EM250, the Texas Instruments CC2430, the SamsungElectro-Mechanics ZBS240
and the Atmel ATmega128RFA1. Radios are also available stand-alone to be used
with any processor or microcontroller. Generally, the chip vendors also offer the ZigBee
software stack, although independent ones are also available. B ecauseZigBee can activate
(go from sleep to active mode) in 15 m sec or less, the latency can be very low and devices
can be very responsive particularly compared to Bluetooth wake-up delays, which are
typically around three seconds. [2] B ecauseZigBees can sleep most of the time, average
power consumptioncan be very low, resulting in long battery life. The first stack releaseis
now called ZigBee
2004. The secondstack releaseis called ZigBee 2006, and mainly replacesthe MSG/KVP
structure used in 2004 with a ”cluster library”. The 2004 stack is now more or le s s
obso- lete.[citation needed]ZigBee 2007, now the current stack release,contains two stack
profiles,stack profile 1 (simply called ZigBee), for home and light commercialuse, and stack
profile
2 (called ZigBee Pro). ZigBee Pro offers more features, such a s multi-casting, many-to-one
routing and high security with Symmetric-Key Key Exchange (SKKE), while ZigBee (stack
profile 1) offers a smaller footprint in RAM and flash. Both offer full mesh networking and
work with all ZigBee application profiles.[citation needed] ZigBee 2007 is fully
backward compatible with ZigBee 2006 devices: A ZigBee 2007 device may join and operate
on a Zig- Bee 2006 network and vice versa. Due to differe nce sin routing options, ZigBee
Pro devicesmust becom e non-routing ZigBee End-Devices (ZEDs) on a ZigBee 2006 or
ZigBee 2007network, the same a s ZigBee 2006 or ZigBee 2007 devicesmust becom eZEDs
on a ZigBee Pro network. The applications running on those devices work the sam e,
regardless of the stack profile be neath them.
1.6 Uses
ZigBee protocols are intended for use in embedded applications requiring low data rates and
low power consumption. ZigBee’s current focus is to define a general-purpose , inexpensive,
self-organizingm esh network that can be used for industrial control, embeddedsensing, med-
ical data collection, smoke and intruder warning, building automation, home
automation, etc. The resulting network will use very small amounts of power
individual devices must have a battery life of at least two years to pass ZigBee
certification.
Typical application areas include
Home Entertainment and Control Smart lighting, advancedtemperature control, safety and
security, movies and music
Home Awareness Water sensors,power sensors,energymonitoring, smoke and fire detectors,
smart appliancesand a cc es ssensors
Mobile Services m-payment, m-monitoring and control, m-security and ac ce s scontrol, m-
healthcareand tele-assist
CommercialBuilding Energy monitoring, HVAC, lighting, a cc e sscontrol
Industrial Plant Proc e s s control, asset management, environmental management,
energymanagement, industrial device control
1.7 Sof tware and hardware
The software is designed to be easy to develop on small, inexpensive microprocessors.The
radio design used by ZigBee has be en carefully optimized for low cost in large scale produc-
tion. It has few analog stagesand use sdigital circuits wherever possible.
Even though the radios themselve s are inexpensive, the ZigBee Qualification Proce ssinvolve s
a full validation of the requirements of the physical layer. This amount of concernabout the
Physical Layer has multip le benefits, since all radios derived from that semiconductormask
set would enjoy the sam e RF characteristics. On the other hand, an uncertified
physical layer that malfunctions could cripple the battery lifespan of other devices on a
ZigBee net- work. Where other protocols can mask poor sensitivity or other esoteric
problems in a fade compensation response, ZigBee radios have very tight engineering
constraints: they are both power and bandwidth constrained. Thus, radios are tested to the
ISO 17025 standard with guidance given by Clause 6 of the 802.15.4-20 06 Standard. Most
vendors plan to integrate the radio and microcontroller onto a single chip.
5
Chapter 2
Proto col stack for Zigb ee
Zigbe e protocol stack mainly consists of PHY and MAC layer from IEEE 802.15.4
stan- dard,Network layer,Application layer.?
Figure 2.1: Zigbe e protocol stack
2.1 PHYSICAL layer
ZigBee operates in one of thre e licensefree bands 2.4 GHz, 915 MHz for North America, and
868 MHz for Europe.At 2.4 GHZ, there are a total of 16 channelsavailable with a maximum
data transfer of 250 kbps.At 915 MHz: 10 channels for a max 40 kbps transfer rate.At 868
MHz: 1 channel for a max 20 kbps transfer rate.
2.1.1 Features of PHY layer:
1. Activation and deactivation of the radio transceiver.
2. energy detection -Here the power of received signal is estimated within bandwidth of
channel .It is used in network layer for channel selection.
3. Link quality indication (LQI)-This indicator shows the quality of the link
betwee ndeviceswithin a Zigbee.It is characterization of strength or quality of received
packet.
4. Clear channel a ssessmnt
e (CCA)-It is performed to detect if the channel is busy is or
empty.A mode in CCA performs the RF energy detection with other wirele s s network
is avoided.
5. Channel selection.
2.2 MAC layer
Mac layer control a cc e ssto the radio channel.Its responsibilities are transmitting
beaconframes,synchroinisation and providing a reliable transmission.
2.2.1 Differe nt mac layer devices
1. Full function device(FFD):
A network device that extends network area coverage,dynamically routes around ob-
stacles,and provides backup routes in c as eof network congestionor device.
2. Reduced function device(RFD)
A network device that can start or receive a m essag e but cannot forward
me s sag e supstream or downstream.It can communicate with the co-ordinator or a
router,but not directely with other end devices.
3. PAN co-ordinator
7
Figure 2.2: Mac layer a ssociation
It is controller of a network that is responsible for the network formation and
main- tanance.ThePAN co-ordinator must be a router.
4. MAC Layer a ssociation
On the power on of end device it sends beacon request.Beaconis a transmission
by a Zigbe e router to confirm their presence o other network devices.PAN
coordinator sends the beacon.Then end device requests for the a ssociation.PAN co-
ordinator checks wheather enough resoursesare present or not if present it sends
acknowledgement.and association is established between PAN co-ordinator and end
device.
2.3 Ne twork Layer
1. Discovery of route and maintenance.
2. Routing of m e ssa ge
3. Clear channel assessmnt
e (CCA)-It is performed to detect if the channel is busy is or
empty.A mode in CCA performs the RF energy detection with other wirele s s network
is avoided.
4. Network management and addressing.
2.3.1 Ne twork layer top ologies
Zigbe e can work in 3 topologies
1. Mesh topology
2. Cluster tree topology
3. Star topology
2.3.2 Mesh top ology in Zigb ee
Figure 2.3: Mesh Topology
Mesh topology,also called peer-to-peer, consistsof a m esh of interconnectedrouters and
end. Each router is typically connected through atleast two pathways, and can relay
m essag esfor its neighbors.Mesh topology supports ”multi-hop ”communications, through
which data is passed by hopping from device to device using the most reliable
communication links and most cost-effective pathuntil its destination is reached.The
multi-hop abili ty also helps to provide fault tolerance, in that if one device fails or
experiences interference,the network can reroute itself using the remaining devices.
2.4 Benefits of Mesh top ology
1. This topology is highly reliable and robust.Should any individual router becom einac-
cessible,alternative routes can be discovered and used.
2. The use of intermediary devicesin relaying data m eansthat the range of the network
can be significantly increased,making this topology highly scalable.
3. Weak signals and dead zonescan be eliminated by simply adding more routers to the
network.
2.5 Limitations of Mesh top ology
1. This topology has a higher communications overhead than the star topology,
which can result in increasedlatency and lower end-to-end performance.
2. Meshed routing requires more complex network protocols. This m eans the
routers require more embedded resources,which can result in
3. increasedpower consumption and costs.
2.6 The power of Mesh Topology
Mesh networking was not created specifically for wireless sensor networks. This
network topology is already hard at work in both the public switched telephone network
(PSTN) and the Internet. The mesh is the best way to achieve the resiliency and
scalability demandedfrom these mission-critical public networks.Examining the key benefits
that mesh topologiesprovide in a bit more detail will help to explain why it is such an
appropriate choice for many wirelesssensornetworks.
2.7 Cluster tree top ology in Zigb ee
The cluster tree topology is le ss efficient than the other two, and is therefore rarely (if ever)
implemented.
2.8 Star top ology in Zigb ee
In a Star topology, also called point-to-point, all devices are within direct
communication range to the coordinator, through which all m e ssagesare routed.A device
sends a m e ssa geto the coordinator, which then p asse sit on to the destination device. Direct
communication
10
Figure 2.4: Star Topology
between the end devicesis not supported.
2.9 Benefits of Star top ology
1. Its simplici ty means that this topology doe s not require a complex network layer
or routing protocols
2. Performanceis generally high, with packets taking a maximum of two hops to reach
their destination.
2.10 limitation of Star top ology
1. )There are no alternative paths between the device and coordinator, so if a path be-
com esobstructed, communication is lost between the device and coordinator
2. )The radius of the network is limited by the radio range betwee n the coordinator and
child devices(typically 30-100meters).
11
2.11 Application layer
Application layer mainly consists of Application support sublayer,Application framework
and Zigbe e device objects
Application Support sublayer-The portion of the Application Layer responsible for pro-
viding a data service to the application and ZigBee device profile s. In addition, it provides
a management serviceto maintain binding links and the storage of the binding table itself.
Application framework-The portion of the Application Layer that provides a description of
how to build a profile onto the ZigBeestack so that profiles can be generatedin a consistent
manner. It also specifies a range of standard data type s for profiles, descriptors to
assistin service discovery, frame formats for transporting data, and a key value pair
construct to
rapidly develop simple, attribute based profiles.
Zigbe e device objects-The portion of the ZigBee Application Layer responsible for defin-
ing the role of the device within the network (e.g. coordinator, router, or end device),
initiating and/or responding to binding and discovery requests, and establishing a
secure relationship betwe en network devices. It also provides a rich set of management
commands,defined in the ZigBee Device Profile (ZDP).
2.12 Reliable ZigBee Ne tworks
ZigBee is a broad-based standard that is intended to cover a range of applications
and competing requirements. Figure 1 shows an example of the range of target markets
typically discussedfor ZigBee.
2.13 Securi ty in Zigb ee
ZigBee security, which is based on a 128-bit AES algorithm, adds to the security
model provided by IEEE 802.15.4. ZigBee’s security service s include methods for key
establishment and transport, device management, and frame protection.The ZigBee
specification definessecurity for the MAC, NWK and APS layers. Security for applications
is typically provided through Application Profiles.
2.13.1 Trust center
The Trust Center decides whether to allow or disallow new devices into its
network.The Trust Center may periodically update and switch to a new Network Key. It
first broadcaststhe new key encrypted with the old Network Key. Later, it tells all
devices to switch to the new key. The Trust Center is usually the network coordinator,
but is also able to be a dedicated device. It is responsible for the following security roles:
12
Figure 2.5: Network
1. Trust Manager, to authenticate devicesthat request to join the network
2. Network Manager, to maintain and distribute network keys
3. Configuration Manager, to enable end-to-end security betwee n devices
2.13.2 Securi ty keys
ZigBee u se s three type s of keys to managesecurity: Master, Network and Link.
2.13.3 Master keys
These optional keys are not used to encrypt frames. Instead, they are used as an
initial shared secret between two devices when they perform the Key Establishment
Procedure
(SKKE) to generateLink Keys.Keys that originate from the Trust Center are called Trust
Center Master Keys, while all other keys are called Application Layer Master Keys.
13
2.13.4 Ne twork keys
These keys perform security Network Layer security on a ZigBee network. All devices
on a ZigBee network share the sam e key.High S ecurity Network Keys must always be sent
en- crypted over the air, while Standard Security Network Keys can be sent either encrypted
or unencrypted. Note that High Security is supported only for ZigBee.
2.13.5 Link keys
Theseoptional keys secureunicast m essag esbetween two devicesat the Application
Layer.Keys that originate from the Trust Center are called Trust Center Link Keys, while all
other keys are called Application Layer Link Keys.
2.14 Securi ty modes
ZigBee offers two different security modes: Standard and High.
2.14.1 Standard securi ty mode
In Standard S ecuri ty mode, the list of device s, master keys, link keys and network keys can
be maintained by either the Trust Center or by the devicesthemselve s . The Trust Center is
still responsible for maintaining a standard network key and it controls policies of network
admittance. In this mode, the memory requirements for the Trust Center are far le ss than
they are for High Security mode.
2.14.2 High securi ty mode
In High Security mode, the Trust Center maintains a list of devices,master keys, link keys
and network keys that it needs to control and enforce the policies of network key updates
and network admittance. As the number of devices in the network grows, so too doe s the
memory required for the Trust Center.
The additional security capabilities inherent in ZigBee PRO are critical as ZigBee
is used in increasingly important applications. The control of critical systems
infrastructure, whether in a commercial building, utili ty grid, industrial plant, or a home
security systemmust not be compromised.?
2.14.3 Difference between Zigb ee and Blueto oth
Bluetooth and ZigBee have much in common. Both are type s of IEEE 802.15 wireless
personal-areanetworks,” or WPANs. Both run in the 2.4-GHz unlicensedfrequency band,
and both use small form factors and low .
14
Table 2.1: Differencebetween Bluetooth and Zigbe e
Characteristics Bluetooth Zigbe e
Range 10-100m 30-100m.
Latency 1 0se c 30ms.
Extendibili ty ye s no
Complexity complex simple
Security PIN 64bit,128bit 128bit AES
Battery life Short long
15
Chapter 3
Zigb ee - Proto col, Devices and
Applications
3.1 Proto col
The protocols are built on recent algorithmic research to construct a low-spee d ad-hoc net-
work of nodes automatically. In large network instances, the network will be a cluster
of clusters in the form of a mesh or a single cluster. ZigBee protocols minimize the
time for which the radio is on to reduce the power use. The current profiles derived from
the ZigBeeprotocols support beaconand non-beaconenablednetworks.
In beacon enabled networks, the special network nodes called ZigBee Routers transmit
periodic beacons to confirm their presence to other network nodes. Beacon Oriented
net- works use Guaranteed Time Slots (GTS). Node s are active only when a beacon is
being transmitted.They may sleep betwe en beacons, that will lower the duty cycle and
increasethe battery life.The intervals may rang e from 15.36 millisecondsto
3.2 What ZigBee’s ”Low Power Consumption” Means
ZigBee’slow power consumption is rooted not in RF power, but in a sleep mode specifically
designedto accommodate battery powered devices. Any ZigBee-compliant radio can switch
automatically to sleep mode when it’s not transmitting, and remain asleep until it
needsto communicate again. For radios connected to battery-powered devices,this results
in ex- tremely low duty cycles and very low average power consumption.
When a radio is in sleep mode, its RF power rating is irrelevant; it’s only when transmit-
ting that its RF power affects power consumption. In the c as eof Cirronet’s ZigBee solutions,
a radio with 100 mW RF power will typically consume150 mA at 3.3 V when transmitting,
16
comparedto 75 mA at 3.3 V for a radio with 1 mW RF power. The 100 mW radio consum es
twice as much power - but only when actively transmitting. As long as the high power radio’s
low noise amplifier is turned off, power consumption while sleepingis roughly equivalent to
that of a low power radio.
If the high RF power radio is awake and transmitting 5very active radio, the extra averag e
power consumption is roughly 5power consumption meansthat a battery that would last for
five years with a 1 mW radio would last four years and nine months with a 100 mW radio.
As this illustrates, ZigBee radios with higher RF output ratings are still excellent candidates
for u se with battery powered devices.
It’s important to note that the ZigBee Alliance doesn’t itself specify anything for
RF power. ZigBee’s RF power specification com es from IEEE 802.15.4,which specifies a
min- imum power output rating of 1 mW, with no specified maximum. The de facto
100 mW
”high power” level relates to the European limit of 100 mW EIRP, including antenna gain.
3.3 Types
There are three different type s of ZigBe e device:
1. ZigBe e coordinator (ZC): The most capable device, the coordinator forms the root of
the network tree and might bridge to other networks. There is exactly one ZigBee co-
ordinator in each network. It is able to store information about the network, including
acting a s the repository for security keys.
2. ZigBe e Router (ZR): Routers can act as an intermediate router, passing data
from other devices.
3. ZigBe e End Device (ZED): Contains just enough functionality to talk to its
parent node (either the coordinator or a router); it cannot relay data from other
devices.
3.4 Ad vantages
1. ZigBee ’s main advantage is its abili ty to be configuredin so-calledmesh networks with
wirelessnod es that are capable of multi- year battery live s.
2. Zigbe e Supports large no of nodes in network.
3. Zigbe e has Low latency period.It is around 30m s.
4. Power consumption in zigbe e is very low a s comparedto other wirelesssensornetwork
technologeshencelong battery life.
5. Low cost
17
6. It Can be used globally since Zigbe e alliance is an open global standard source.
7. Zigbe e network designsare simple.
3.5 Disad vantages
1. It works over short range.
2. Data rate is low.
3.6 Applications of Zigb ee
1. Home Automation-The ZigBee Home Automation profile is likely to be the first ZigBee
application profile to hit the marketplace in volume and also holds promise to be the
first application space where multiple products from multiple vendors are truly inter-
operable allowing users to mix and match products to enhancetheir digital lifestyle.
Lighting control, thermostats, occupancy and motion sensors,security systems, door
and window sensors,as well a s fixed and mobile keypads all occupy the ZigBee home
automation spaceand can be bound together to make sophisticated home automation
behaviors.
2. Building automation-Wireless sensing and control m esh networks can make
building automation easier and more efficient by combining lighting,HVAC, security,
safety sys-tems, and other monitoring networks into a single platform.
3. Industrial plant monitoring-Wirelesssensingand control mesh networks provide accu-
rate and efficient IPM, and are also ideal to deploy in hazardousenvironments in which
you want to minimize human exposure.
4. PC and peripherals-PCand peripheralslike mouse,keyboard,joystic can be automated.
5. personelhealth care-Patient monitoring,remotediagnosisare incuded in personelhealth
care applications.
18
Chapter 4
Conclusion
Comparing ZigBee technology with the other present technology it is evident that
ZigBee can have a safe future in this effervescent world of technology.There is definitely a
place on the market for ZigBee, since no global standard exists today in the wirelesssensor
network area.
ZigBee is the specification of a low-cost, low-power wirelesscommunications solution, meant
to be integrated a s the main building block of ubiquitous networks. It is maintained by the
ZigBee Alliance, which develops the specification and certifies its proper
implementation. As of 2007, the latest publicly available revision is the 2006 version.
19
Bibliograp hy
[1] Eli Yablonovitch, “Inhibited SpontaneousEmission in Solid-State Physics and Electron-
ics,” Phys. Rev. Lett., Vol.58, No.20, pp-2059-2062,June 1987.
[2] S.John, “Strong Localization of Photons in Certain Disordered Dielectric Superlattices,”
Phys. Rev. Lett., Vol.58, No.23, pp-2486-2489,June 1987.
[3] P.Lalanne, “Electromagnetic Analysis of Photonic Crystal WaveguidesOperating Above
the Light Cone,” IEEE J. Quantum Electron, Vol 38, No.7 , pp 800-804,July 2002.
[4] Babak Momeni, Ali Adibi, “An Approximate Effective Index Model for Efficient Analysis
and Control of Beam Propagation Effects in Photonic Crystals,” Journal of
LightwaveTechnology, Vol.23, No.3, pp-1522-1532,March 2005.
[5] J.Jaonnopoulos, R. Meade,J.Winn, Photonic Crystals- Molding the flow of light, (Prince-
ton Univ. Press,New Jersey, 1995).
[6] Hatic e Altug and Jelena Vuckovic, “Photonic Crystal Nanocavity Arrays,” IEEE LEOS
Newsletter, pp-4-11, April 2006.
[7] S.Noda, A. Chutinan, M.Imada, “Trapping and emissionof photons by a single defect in
a photonic bandgap structure,” Nature, Vol.407, pp-608-610, October 2000.
[8] , M.Loncar, D. Nedeljkovic, T. Doll, J. Vuckovic, A. Scherer,
T.Pearsall,“Waveguidingin planar photonic crystals,” Appl.Phys. Lett., Vol.77, No.13,
pp-1937-1939, September
2000.
[9] E.Chow, S.Lin, S.Johnson, P.Villeneuve, J.Joannopoulus, J.Wendt, G.
Vawter, W.Zubrzycki, H.Hou, A. Alleman, “Three dimensional control of light in a
two dimen- sional photonic crystal slab,” Nature, Vol.407, pp-983-986,October 2000.
[10] H.Taniyama, “Waveguidingstructures using one-dimensionalphotonic crystal,” Journal
of Applied Physics, Vol. 91, No.06, pp-3511-351
5, March 2002.
[11] J.S oong, Y.Park, H.Jeon, “Optimal Design for One-DimensionalPhotonic Crystal
Waveguide,” Journal of Lightwave Technology, Vol.22, No.2, pp-509-513,February 2004.
20
[12] P.Russell, S.Tredwell, P.Roberts, “Full photonic bandgaps and spontaneous
emissioncontrol in 1D multilayer dielectric structures,” Optics Communication,
Vol.160, pp-66-
71, February 1999.
[13] P. Yeh and A. Yariv,“Bragg reflection waveguides,”Opt. Commun., Vol. 19, pp-427-430,
1976.
[14] S. Lin, E. Chow, V. Hietala, P. R. Villeneuve, and J. D. Joannopoulos,
“Experimen- tal demonstration of guiding and bending electromagnetic wave s in a
photonic crys- tal,” Science, Vol. 282, pp-274-276,1998.
[15] M. Tokushima, H.Kosaka, A. Tomita, and H.Yamada, “Lightwave propagation through
a 120 degrees sharply bent single-line-defectphotonic crystal waveguide,”Appl. Phys.
Lett., Vol. 76, No.8, pp-952-954,2000.
[16] N. Stefanou and A. Modinos, “Impuri ty bands in photonic insulators,”Phys. Rev. B ,
Vol. 57, No.19, pp-12 127-12133, 1998.
[17] I. El-Kady, M.M. Sigalas, R. Biswas, and K. M. Ho, “Dielectric waveguides in
two- dimensional photonic bandgap materials,”J. Lightwave Tech., Vol. 17, No.11,
pp-2042-
2049, 1999.
[18] G. Tayeb and D. Maystre, “Rigorous theoretical study of finite-size two-
dimensional photonic crystals doped by microcavities,”J.Opt.Soc.Am.A, Vol.14, No.12,
pp-3323-3332,
1997.
[19] D. Zhou, W. P. Huang, C. L. Xu, D. G. Fang, B. Chen, “The perfectly matched layer
boundary condition for scalar finite-difference time domain method, ”IEEE
PhotonicsLett., Vol.13, No.5, pp-454-456,2001.
[20] S. Boscolo,C. Conti, M. Midrio and C. G. Someda, “Numerical analysis of propagation
and impedance matching in 2-D photonic crystal waveguides with finite length,”J.
of Lightwave Tech., Vol. 20, No. 2,pp- 304-310,2002.
[21] S . Boscolo, C. Conti, M. Midrio,“Y junctions in photonic crystal channel waveguides:
high transmissionand impedancematching,”Optics Lett., Vol. 27, No. 12, pp-1001-1003,
2002.
[22] http://www.te chnologyreview.com/articles/zigbe e
[23] http://www.zigb ee.org
[24] http://www.wisegeek.com
[25] http://computing.arizona.edu
[26] http://en.wikip edia.org/wiki/ZigBee
21
[27] http://www.dai ntree.com
22