1 / 7

IWD2243 Wireless & Mobile Security

IWD2243 Wireless & Mobile Security. Chapter 5 : Wireless Embedded System Security. 5.1 Wireless Technologies. Wi Fi , cellular technologies, ZigBee , Bluetooth. Cellular communications – most recognizable form of wireless technologies.

rolf
Download Presentation

IWD2243 Wireless & Mobile Security

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. IWD2243Wireless & Mobile Security Chapter 5 : Wireless Embedded System Security Prepared by : Zuraidy Adnan, FITM UNISEL

  2. 5.1 Wireless Technologies • WiFi, cellular technologies, ZigBee, Bluetooth. • Cellular communications – most recognizable form of wireless technologies. • See figure 23.1 : Comparison of Wi-Fi, ZigBee, Bluetooth, and Cellular GSM, page 603. • Most of the Wireless Embedded technologies has been describe before as the following :- • WiFi& cellular technologies – Chapter 2, Security in TWN • Bluetooth – Chapter 4, Security in wireless ad hoc network. Prepared by : Zuraidy Adnan, FITM UNISEL

  3. 5.2 ZigBee • Designed around IEEE 802.15.4 low-power radio standard. • Aims to be the go-to standard for industrial wireless communication where troughput is less of an issue, and flexibility, power consumption, and cost are primary concern. • See figure 23.3 : Throughput comparison, page 611 • Develop and maintained by ZigBee Alliance • ZigBee Alliance is a consortium of corporations that all utilize the protocol Prepared by : Zuraidy Adnan, FITM UNISEL

  4. 5.2 ZigBee • Low power consumption, low system resource requirements, and low throughput. • The bandwidth of ZigBee is comparable to dial up modem (up to 250KB/s). • ZigBee may seem very similar to Bluetooth • Primarily concerned with the flexibility of the network, support several network topologies that increase reliability of the entire network. • Geared toward industrial automation (industrial standard) Prepared by : Zuraidy Adnan, FITM UNISEL

  5. 5.2 ZigBee • Security in ZigBee • Self healing mesh network • Allows for thousand of nodes to be included in a single network(PAN) • Supports several different network topologies, including mesh and clusters. • See figure 23.4 : ZigBee topologies, page 612 • Self healing network – the network is resilient and can deal with nodes coming in and out of the network, in a noisy (RF noise) industrial environment. • Self healing property make redundancy very easy to implement. Prepared by : Zuraidy Adnan, FITM UNISEL

  6. 5.2 ZigBee • Security in ZigBee (cont.) • Ex. – Attacker taking out nodes in a sensor network to prevent certain information to be collected. • In WiFi network, once a node is dropped, it must reestablish the connection, including any authentication required. • In ZigBee network, there can be many more nodes, and if any nodes are dropped due to tampering, the network continue to function. • Variety of network topology supported, different security considerations. • Ad hoc peer-to-peer topologies, all nodes are considered equal. Prepared by : Zuraidy Adnan, FITM UNISEL

  7. 5.2 ZigBee • Security in ZigBee (cont.) • Star & Tree topologies – there must be a coordinator that facilitates the network. • ZigBee nodes can also function as routers, directing communications between nodes that may not be able to communicates directly • Provides low level security for communications between individual nodes using AES and message authentication code scheme. Prepared by : Zuraidy Adnan, FITM UNISEL

More Related