70 likes | 233 Vues
IWD2243 Wireless & Mobile Security. Chapter 5 : Wireless Embedded System Security. 5.1 Wireless Technologies. Wi Fi , cellular technologies, ZigBee , Bluetooth. Cellular communications – most recognizable form of wireless technologies.
E N D
IWD2243Wireless & Mobile Security Chapter 5 : Wireless Embedded System Security Prepared by : Zuraidy Adnan, FITM UNISEL
5.1 Wireless Technologies • WiFi, cellular technologies, ZigBee, Bluetooth. • Cellular communications – most recognizable form of wireless technologies. • See figure 23.1 : Comparison of Wi-Fi, ZigBee, Bluetooth, and Cellular GSM, page 603. • Most of the Wireless Embedded technologies has been describe before as the following :- • WiFi& cellular technologies – Chapter 2, Security in TWN • Bluetooth – Chapter 4, Security in wireless ad hoc network. Prepared by : Zuraidy Adnan, FITM UNISEL
5.2 ZigBee • Designed around IEEE 802.15.4 low-power radio standard. • Aims to be the go-to standard for industrial wireless communication where troughput is less of an issue, and flexibility, power consumption, and cost are primary concern. • See figure 23.3 : Throughput comparison, page 611 • Develop and maintained by ZigBee Alliance • ZigBee Alliance is a consortium of corporations that all utilize the protocol Prepared by : Zuraidy Adnan, FITM UNISEL
5.2 ZigBee • Low power consumption, low system resource requirements, and low throughput. • The bandwidth of ZigBee is comparable to dial up modem (up to 250KB/s). • ZigBee may seem very similar to Bluetooth • Primarily concerned with the flexibility of the network, support several network topologies that increase reliability of the entire network. • Geared toward industrial automation (industrial standard) Prepared by : Zuraidy Adnan, FITM UNISEL
5.2 ZigBee • Security in ZigBee • Self healing mesh network • Allows for thousand of nodes to be included in a single network(PAN) • Supports several different network topologies, including mesh and clusters. • See figure 23.4 : ZigBee topologies, page 612 • Self healing network – the network is resilient and can deal with nodes coming in and out of the network, in a noisy (RF noise) industrial environment. • Self healing property make redundancy very easy to implement. Prepared by : Zuraidy Adnan, FITM UNISEL
5.2 ZigBee • Security in ZigBee (cont.) • Ex. – Attacker taking out nodes in a sensor network to prevent certain information to be collected. • In WiFi network, once a node is dropped, it must reestablish the connection, including any authentication required. • In ZigBee network, there can be many more nodes, and if any nodes are dropped due to tampering, the network continue to function. • Variety of network topology supported, different security considerations. • Ad hoc peer-to-peer topologies, all nodes are considered equal. Prepared by : Zuraidy Adnan, FITM UNISEL
5.2 ZigBee • Security in ZigBee (cont.) • Star & Tree topologies – there must be a coordinator that facilitates the network. • ZigBee nodes can also function as routers, directing communications between nodes that may not be able to communicates directly • Provides low level security for communications between individual nodes using AES and message authentication code scheme. Prepared by : Zuraidy Adnan, FITM UNISEL