iwd2243 wireless mobile security
Download
Skip this Video
Download Presentation
IWD2243 Wireless & Mobile Security

Loading in 2 Seconds...

play fullscreen
1 / 7

IWD2243 Wireless & Mobile Security - PowerPoint PPT Presentation


  • 136 Views
  • Uploaded on

IWD2243 Wireless & Mobile Security. Chapter 5 : Wireless Embedded System Security. 5.1 Wireless Technologies. Wi Fi , cellular technologies, ZigBee , Bluetooth. Cellular communications – most recognizable form of wireless technologies.

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about ' IWD2243 Wireless & Mobile Security' - booth


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
iwd2243 wireless mobile security

IWD2243Wireless & Mobile Security

Chapter 5 : Wireless Embedded System Security

Prepared by : Zuraidy Adnan, FITM UNISEL

5 1 wireless technologies
5.1 Wireless Technologies
  • WiFi, cellular technologies, ZigBee, Bluetooth.
  • Cellular communications – most recognizable form of wireless technologies.
  • See figure 23.1 : Comparison of Wi-Fi, ZigBee, Bluetooth, and Cellular GSM, page 603.
  • Most of the Wireless Embedded technologies has been describe before as the following :-
    • WiFi& cellular technologies – Chapter 2, Security in TWN
    • Bluetooth – Chapter 4, Security in wireless ad hoc network.

Prepared by : Zuraidy Adnan, FITM UNISEL

5 2 zigbee
5.2 ZigBee
  • Designed around IEEE 802.15.4 low-power radio standard.
  • Aims to be the go-to standard for industrial wireless communication where troughput is less of an issue, and flexibility, power consumption, and cost are primary concern.
  • See figure 23.3 : Throughput comparison, page 611
  • Develop and maintained by ZigBee Alliance
  • ZigBee Alliance is a consortium of corporations that all utilize the protocol

Prepared by : Zuraidy Adnan, FITM UNISEL

5 2 zigbee1
5.2 ZigBee
  • Low power consumption, low system resource requirements, and low throughput.
  • The bandwidth of ZigBee is comparable to dial up modem (up to 250KB/s).
  • ZigBee may seem very similar to Bluetooth
  • Primarily concerned with the flexibility of the network, support several network topologies that increase reliability of the entire network.
  • Geared toward industrial automation (industrial standard)

Prepared by : Zuraidy Adnan, FITM UNISEL

5 2 zigbee2
5.2 ZigBee
  • Security in ZigBee
    • Self healing mesh network
    • Allows for thousand of nodes to be included in a single network(PAN)
    • Supports several different network topologies, including mesh and clusters.
    • See figure 23.4 : ZigBee topologies, page 612
    • Self healing network – the network is resilient and can deal with nodes coming in and out of the network, in a noisy (RF noise) industrial environment.
    • Self healing property make redundancy very easy to implement.

Prepared by : Zuraidy Adnan, FITM UNISEL

5 2 zigbee3
5.2 ZigBee
  • Security in ZigBee (cont.)
    • Ex. – Attacker taking out nodes in a sensor network to prevent certain information to be collected.
    • In WiFi network, once a node is dropped, it must reestablish the connection, including any authentication required.
    • In ZigBee network, there can be many more nodes, and if any nodes are dropped due to tampering, the network continue to function.
    • Variety of network topology supported, different security considerations.
    • Ad hoc peer-to-peer topologies, all nodes are considered equal.

Prepared by : Zuraidy Adnan, FITM UNISEL

5 2 zigbee4
5.2 ZigBee
  • Security in ZigBee (cont.)
    • Star & Tree topologies – there must be a coordinator that facilitates the network.
    • ZigBee nodes can also function as routers, directing communications between nodes that may not be able to communicates directly
    • Provides low level security for communications between individual nodes using AES and message authentication code scheme.

Prepared by : Zuraidy Adnan, FITM UNISEL

ad