Iwd2243 wireless mobile security
This presentation is the property of its rightful owner.
Sponsored Links
1 / 7

IWD2243 Wireless & Mobile Security PowerPoint PPT Presentation


  • 101 Views
  • Uploaded on
  • Presentation posted in: General

IWD2243 Wireless & Mobile Security. Chapter 5 : Wireless Embedded System Security. 5.1 Wireless Technologies. Wi Fi , cellular technologies, ZigBee , Bluetooth. Cellular communications – most recognizable form of wireless technologies.

Download Presentation

IWD2243 Wireless & Mobile Security

An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -

Presentation Transcript


Iwd2243 wireless mobile security

IWD2243Wireless & Mobile Security

Chapter 5 : Wireless Embedded System Security

Prepared by : Zuraidy Adnan, FITM UNISEL


5 1 wireless technologies

5.1 Wireless Technologies

  • WiFi, cellular technologies, ZigBee, Bluetooth.

  • Cellular communications – most recognizable form of wireless technologies.

  • See figure 23.1 : Comparison of Wi-Fi, ZigBee, Bluetooth, and Cellular GSM, page 603.

  • Most of the Wireless Embedded technologies has been describe before as the following :-

    • WiFi& cellular technologies – Chapter 2, Security in TWN

    • Bluetooth – Chapter 4, Security in wireless ad hoc network.

Prepared by : Zuraidy Adnan, FITM UNISEL


5 2 zigbee

5.2 ZigBee

  • Designed around IEEE 802.15.4 low-power radio standard.

  • Aims to be the go-to standard for industrial wireless communication where troughput is less of an issue, and flexibility, power consumption, and cost are primary concern.

  • See figure 23.3 : Throughput comparison, page 611

  • Develop and maintained by ZigBee Alliance

  • ZigBee Alliance is a consortium of corporations that all utilize the protocol

Prepared by : Zuraidy Adnan, FITM UNISEL


5 2 zigbee1

5.2 ZigBee

  • Low power consumption, low system resource requirements, and low throughput.

  • The bandwidth of ZigBee is comparable to dial up modem (up to 250KB/s).

  • ZigBee may seem very similar to Bluetooth

  • Primarily concerned with the flexibility of the network, support several network topologies that increase reliability of the entire network.

  • Geared toward industrial automation (industrial standard)

Prepared by : Zuraidy Adnan, FITM UNISEL


5 2 zigbee2

5.2 ZigBee

  • Security in ZigBee

    • Self healing mesh network

    • Allows for thousand of nodes to be included in a single network(PAN)

    • Supports several different network topologies, including mesh and clusters.

    • See figure 23.4 : ZigBee topologies, page 612

    • Self healing network – the network is resilient and can deal with nodes coming in and out of the network, in a noisy (RF noise) industrial environment.

    • Self healing property make redundancy very easy to implement.

Prepared by : Zuraidy Adnan, FITM UNISEL


5 2 zigbee3

5.2 ZigBee

  • Security in ZigBee (cont.)

    • Ex. – Attacker taking out nodes in a sensor network to prevent certain information to be collected.

    • In WiFi network, once a node is dropped, it must reestablish the connection, including any authentication required.

    • In ZigBee network, there can be many more nodes, and if any nodes are dropped due to tampering, the network continue to function.

    • Variety of network topology supported, different security considerations.

    • Ad hoc peer-to-peer topologies, all nodes are considered equal.

Prepared by : Zuraidy Adnan, FITM UNISEL


5 2 zigbee4

5.2 ZigBee

  • Security in ZigBee (cont.)

    • Star & Tree topologies – there must be a coordinator that facilitates the network.

    • ZigBee nodes can also function as routers, directing communications between nodes that may not be able to communicates directly

    • Provides low level security for communications between individual nodes using AES and message authentication code scheme.

Prepared by : Zuraidy Adnan, FITM UNISEL


  • Login