Research of ZigBee’s data security and protection
ZigBee环境监测技术中英文资料对照外文翻译文献综述

ZigBee环境监测技术中英文资料对照外文翻译文献综述简介本文综述了有关ZigBee环境监测技术的中英文资料,并提供了对照的外文翻译文献。
ZigBee是一种低功耗的无线通信技术,特别适用于物联网应用中的环境监测。
通过对这些资料的对比和研究,可以更好地了解和应用ZigBee环境监测技术。
中文资料1. 许明宝, 胡永凡, 钟红民. 基于ZigBee的环境监测系统研究[J]. 现代检测技术, 2011, 31(1): 5-8.2. 杨洛, 李明洲. 基于ZigBee的温湿度监测系统设计[J]. 现代电子技术, 2012(9): 29-32.3. 谭勇, 王群, 李吉庆. 基于ZigBee的室内环境监测系统设计[J]. 仪器仪表学报, 2015, 36(3): 571-575.英文资料1. Wang, X., Hu, Z., & Hang, L. Wireless sensor network-based indoor temperature and humidity monitoring system using ZigBee technology[C]. 2020 6th International Conference on Control, Automation and Robotics (ICCAR), 2020: 100-105.2. Gao, J., Li, R., & Zhang, L. Study on wireless temperature and humidity monitoring system based on ZigBee[C]. 2019 4th International Conference on Green Technology and Sustainable Development (GTSD), 2019: 1-5.外文翻译文献1. 许明宝, 胡永凡, 钟红民. 基于ZigBee的环境监测系统研究(英文翻译). 现代检测技术, 2011, 31(1): 5-8. (Translation of "Research on ZigBee-based Environmental Monitoring System" by Xu Mingbao, Hu Yongfan, and Zhong Hongmin)2. 杨洛, 李明洲. 基于ZigBee的温湿度监测系统设计(英文翻译). 现代电子技术, 2012(9): 29-32. (Translation of "Design of ZigBee-based Temperature and Humidity Monitoring System" by Yang Luo and Li Mingzhou)3. 谭勇, 王群, 李吉庆. 基于ZigBee的室内环境监测系统设计(英文翻译). 仪器仪表学报, 2015, 36(3): 571-575. (Translation of "Design of ZigBee-based Indoor Environment Monitoring System" by Tan Yong, Wang Qun, and Li Jiqing)以上是有关ZigBee环境监测技术的中英文资料对照外文翻译文献综述。
翻译_混合Zigbee和RFID网络节能和寿命最大化

ZigBee-RFID混合网络的节电与寿命的最大化P. Medagliani , G. Ferrari M. Marastoni意大利帕尔玛大学信息工程学系,无线Ad-hoc传感器网络(WASN)实验室Pride s.p.a., I-20151 米兰, 意大利摘要ZigBee是一种的无线个人区域网络标准,应用在需求低功耗的情况,比如无线传感器与控制网络。
由于节点可能被布置在一个交通不便的地方,因此需要高能量效率,最大限度地提高网络的寿命和减少维护费用。
为了提高寿命,一个简单而直接的解决办法是关闭所有不必要的节点,例如,当节点空间密度大于检测需要时,就可以关闭那些不必要的节点。
我们设想一个新型ZigBee无线交互网络,远程传感器节点可以选择性地关闭。
更确切地说,无线控制是基于射频识别(RFID)技术,从而实现一个ZigBee/RFID 混合结构。
换言之,我们考虑使用两个逻辑重叠的网络,RFID和ZIGBEE网络。
RFID网络,通过一个电源关闭算法打开或关闭节点的ZigBee网络。
这个算法被称为深度睡眠算法,旨在平衡各个ZigBee节点的剩余能量。
事实上,RFID控制器(即阅读器)循环开关剩余能量很低的ZigBee节点。
通过构建所提出的RFID控制ZIGBEE技术,我们专注于观测点的需要最少的空间密度实现。
这是出于实际利益考虑,比如在一个分布式监控应用中,其中一个节点需要使用同一种方式监控尽可能大的区域。
在这种情况下,我们在监控区域引进了一种虚拟空间网格,并且在网络中的每个节点应用深度睡眠算法,要求在同一时间最多只有一个节点是工作的。
我们利用基于Opnet网络模拟对所提出的ZigBee-RFID混合网络进行分析。
1.简介无线传感器网络是一个有趣的研究课题,不仅在军事领域,也同时在民用领域。
特别是在远程/环境监测、保护区的监视等,都是无线传感网络技术的重要应用领域。
这些应用通常需要低耗能和低成本。
ZigBee联盟提出了一项最新的无线网络标准,其具有低传输速率和高能量效率。
ZigBee外文文献加翻译

A Coal Mine Environmental Monitor System with LocalizationFunction Based on ZigBee-Compliant PlatformDongxuan YangCollege of Computer and InformationEngineeringBeijing Technology and BusinessUniversityBeijing, ChinaYan ChenCollege of Computer and InformationEngineeringBeijing Technology and BusinessUniversityBeijing, China*****************Kedong WangCollege of Computer and InformationEngineeringBeijing Technology and BusinessUniversityBeijing, ChinaAbstract—This paper describes and implements a new type of coal mine safety monitoring system, it is a kind of wireless sensor network system based on ZigBee technology. The system consists of two parts underground and surface. Wireless sensor networks are constituted by fixed nodes, mobile nodes and a gateway in underground. PC monitoring software is deployed in the surface. The system can not only gather real-time environmental data for mine, but also calculate the real-time location of mobile nodes worn by miners.Keywords:ZigBee; localization; wireless sensor networks; coal MineI.RESEARCH STATUSAs an important energy, coal plays a pivotal role in the economic development. Coal mine monitoring system, is the important guarantee for coal mine safety and high efficiency production [1]. In order to ensure the safe operation, the installation of environment monitoring node in tunnels to real-time detection is very important. However, commonly used traditional monitoring node wired connection to obtain communication with the control system, this node exist wiring difficulties, expensive and other shortcomings. In contrast, wireless sensor node can be easily with current mine monitoring network connection, and good compatibility, facilitate constituted mine gas monitoring network, to suit various size of mine applications. Since wireless nodes are battery powered, so completely out of the shackles of the cable, shorten the construction period can be arranged at any time where the need to use.The ZigBee wireless communication technology is used in this coal mine environmental monitor system. This is a new short-range, low complexity, low power,low data rate, low-cost two-way wireless communication technology [2]. Now, wireless sensor network product based on ZigBee technology are quantity and variety, but the real product can be applied in underground environments of special sensor node is very few[3]. The sensor node that we designed in the system is truly able to apply to in-well environment, it through the wireless sensor node security certification. At the same time, due to the special nature of the wireless network is that it can spread the wireless signal, we can easily locate staff for coal mine safety monitoring provides more protection [4].II. SYSTEM ARCHITECTUREThis system is a comprehensive monitoring system which is combined with software and hardware. Hardware part includes wireless mobile nodes and fixed nodes which were deployed in the underground tunnel, the main function of them is to collect coal mine environment data and require person’s location. Software part refers to the PC monitoring software which is designed in VC++ is used to summarize and display the data of each node. Monitoring node is divided into mobile nodes and fixed nodes; they are using ZigBee protocol for wireless transmission of data. Because the fixed node is also using wireless data transmission method, so it's deployed in the underground roadway becomes very convenient. As the mobile node is carried by the miner, it must be using wireless transmission method. This allows the mine to form a topology of ZigBee wireless sensor network. The fixed node in wireless sensor network is router device and the mobile node carried by miner is the end device. Normally, the router of ZigBee network has no sensor equipment; it is only responsible for data forwarding. But considering the practical application, we believe that add sensor devices on the router will be better on monitoring underground coal mine environment. So in our design, the router also has an environment monitoring function which is usually designed in end device.Fixed node will sent received data from mobile node to the gateway, then the gateway transmits data to monitor computer through RS232 or optical fiber. The PC monitor software in the computer will process all data and display them in a visualization window. The PC software also calculates each mobile node’s real-time location through the specific localization algorithm, according to the received signal strength (RSSI) obtained from mobile nodes.III. NODE DESIGNSince the ZigBee wireless network platform sold on present market was designed for the general environment, for special underground so they are not suitable for the environment. Therefore, we need to customize the system for underground environment whit a special hardware circuit. Node photo are shown in Fig. 1 Then wireless microcontroller CC2530 chip is the core processor of the node device, it can constitute a ZigBee network with very few peripheral circuits. TheCC2530 is an IEEE 802.15.4 compliant true System-on-Chip, supporting theproprietary 802.15.4 market as well as the ZigBee, ZigBee PRO, and ZigBee RF4CE standards. Unlike other wireless chip, CC2530 built-in 8051 monolithic integrated circuits kernel, therefore we no longer need to use a single MCU to control the circuit, and this save us a lot of cost [5].A.Mobile NodeThe mobile node is the end device of a ZigBee network that can be carried by miner; it should be a portable and low power consumption node. So the mobile node we designed is only as small as a mobile phone, and it is by built-in lithium ion battery power supply. In power loss, the core processor CC2530 is a low power consumption chip, when it is in the sleep mode, it only need to use less then 1uA work current. In order to reduce power consumption as much as possible on the display, a 100*32 pixel matrix with no backlighting LCD screen was used. The battery’s capacity of the mobile node is 1500mAh,so it is enough to meet the miner’s long hour works in the underground. The battery charge management chip is TP4057, the maximum charge current can up to 500Ma.Figure 1. Node photo.The mobile node circuit includes the gas concentration sensor MJ4.0 and temperature sensor PT-1000. As far as we know, many wireless sensor platforms use the digital type sensor. The communication between the digital sensor and the MCU need strict timing requirements. But considering the actual application, the wireless MCU usually has a real-time operating system in general, if we use the microcomputer to simulate the strict timing, it will affect the real-time of whole operating system. These two sensors output analog signals not digital signals. Only input this signal into a differential amplifier, can we get an appropriate signal that can be converted to a digital signal by an ADC mode within the CC2530 chip. In order to facilitate the carrying, external antenna was not used in our mobile node, instead ofusing a 2.4GHz patch antenna. And we customize a shell like a cell phone size; it is enough to put all PCBs, sensors and battery in it. Taking into account the small shell of the explosive performance is not very good, the design of PCBs and the selection of component are all carried out the safety assessment.B. Fixed NodeFixed node is installed in the wall of the underground tunnel. Because it is big than the mobile node, it is not appropriate to carry around. The circuit of the fixed node is almost same with the mobile node, it also use a CC2530 chip as core processor. Because of underground tunnels generally deploy with power cable, fixed nodes can use cable power-supply modes. At the same time, because we use wireless signal transmission, the deployment of new fixed nodes become very convenient, which also resolves the problem of the signal lines deployment.As a fixed node, the minor who is doing work may far from it, in order to facilitate the miners observed environmental data around the fixed nodes, it uses LED digital display. At the same time, the large current LED lights and buzzer are designed in the circuit; it makes the fixed node with the function of sound-light alarm. Considering that it may occur the emergency of without electricity, fixed node also built-in a lithium-ion battery. Under normal conditions, lithium-ion battery is in charging status, when external cable disconnect, fixed node is automatic switched to battery power, which can ensure the mobile node can deliver the information through fixed nodes in underground.Without regarding to fixed nodes’ portability, we have a customized shell that has excellent explosion properties, and the internal space is enough to hold down the 2.4 GHz antenna. To ensure safety, all cables and the location of sensors are placed with particular glue sealed, so that it has a good seal.IV.POSITIONING FUNCTIONOne of the important functions of the wireless sensor networks is localization, especially in the underground tunnel, it relates to the safe of the miner's life. Currently most widely used orientation method is GPS satellite positioning, it is a high precision, all-weather and global multifunctional system with the function of radio navigation, positioning and timing. But the GPS positioning method is not suitable for the underground work environment of coal mine, once you enter the underground, it cannot receive satellite signal, thus unable to achieve targeting [6]. We need to consider how to use wireless network to realize positioning function, means using wireless signal between the communications of devices for positioning. The existing distance measuring technology between the wireless-devices basically is the following kinds of methods: TOA, TDOA, AOA and RSSI.About the TOA method, the distance between the two devices is determined by the product of the speed of light and transmission time [7]. Although the precision of this method is accurate, but it require a precise time synchronization, so it demand hardware is higher.TDOA technology need ultrasonic signal,which is setting on a node with receive and transmit function. When measure the distance, it can sent ultrasonic wave and wireless signals together. By measuring the difference between two signals arrival time, we can calculate the distance between two devices [8]. Using this method can also obtain accurate result, but the method need to increase ultrasonic sending and receiving device on the node circuit, it will increase cost.AOA technology needs to install multiple antennas through the nodes so it canobtain adjacent nodes’ signals on deferent directions [9]. With this it can determine the location information from number of adjacent nodes and calculate its own position. This method not only need to add additional hardware, but also it's still very vulnerable to external disturbance, therefore it's not suitable for utilize.RSSI ranging is a cheap and easy technology. By using this method, we don't need to add additional hardware design. We also do not need very precise time requirements. This technique is about with measuring the wireless signals strength in the propagation of the loss, to measure the distance between two nodes. Because of this method requires hardware equipment is less, algorithm is simple, so it has been using in many wireless communication field. Comprehensive all conditions, positioning on the use of RSSI ranging technique.A. Hardware Location EngineThe CC2431 wireless microcontroller chip produced by TI Company has a hardware location engine. From the software's point of view, CC2431’s hardware location engine has a very simple API interface, as long as writing the necessary parameters and waiting for calculation, it can read the location results [10].The hardware location engine is also based on RSSI technology. The localization system includes reference nodes and blind nodes. The reference node is a fixed node that located in a known position, the node know their place and send a packet notifyto other nodes. The blind node receives packets from reference nodes, which can obtains reference nodes’ location and the corresponding RSSI value and put them into the hardware location engine, and then the blind node’s location can be read from the engine [11].On the surface, using the CC2431 hardware location engine targeting the program as a good choice, but considering the practical application, it will encounter the following problems. First of all, we have choose the CC2530 as the main chip of fixed nodes of the system, its internal programs is running in ZigBee2007 protocol, but CC2431 as a early chip, it applies only to ZigBee2006 protocol. In the communications between CC2431 and CC2530 that will have compatibility problems. Secondly, CC2431 hardware location engine use the distributed computing, all mobile nodes’ location are calculated by themselves, and then they upload information to the gateway node, this will not only occupy the mobile node processing time, still it can take up more network resources. For this reason, we have to shelve this approach, consider how to implement location by using CC2530 chip.B. Software Location EngineIf we want to use CC2530 to implement location function, that we must write software location engine by ourselves. Because that chip do not have a hardware location engine inside of it. This software location engine is still used RSSI technology; meanwhile mobile node position is calculated by the PC software, so asto reduce the burden of mobile node computing. To calculate the mobile node location, there must be at least three reference nodes. We will regard router nodes as reference nodes in network, and record the X, Y coordinates of every reference node. Then we let the mobile node send signal to each reference node, so that each reference node can obtain a RSSI values, with these parameters, we can use trilateral measurement method to calculate the specified location of the mobile node. The simpler way give the mobile node to broadcast way to send data, then around it every router node would receive the data from the mobile node, thus obtains RSSI values. Once the mobile node number increasing network, this method will make router nodes more burden, because the every radio message that the router node receives will transmit from the low layer to the top layer. Finally the application layer will analyze data packets. Infact, the mobile node need not to broadcast transmitted data, other routing node can also receive the mobile node packets. Only child mobile nodes of the router node will continue to transmit the packet forwarding upward, the other router nodes will shield out the packet in the bottom of the protocol.In order to let all router nodes can receive the packet which sending by mobile nodes, and send its RSSI values up to the gateway node, we need to modify the relevant function in Z- Stack protocol which is provided by TI. First we find the function named afIncomingData, it deals with the received data from the bottom of protocol, in which we add some code that can obtain packet’s RSSI value. Then through the osal_set_event function to add and send an eventMY_RSSI_REPORT_EVT of RSSI value task to OSAL polling system. This event’s corresponding function will be executed in the task of OSAL interrupt-driven function, thus the mobile node corresponding RSSI values will be sent to gateway node. Through this method, the packet will only be processed by bottom function of the protocol. According to this method we can obtain corresponding RSSI value and save the computation time of mobile nodes.In fact, this software location engine is not implementing with a single mobile node, but through the operation of the whole system to achieve. By which the mobile node is only responsible for sending unicast packets. The mobile node’s parent router node is responsible to forward the packet to the gateway. Other router nodes are not responsible for forwarding this packet, just clipping the mobile node of RSSI value, then forwarded to the gateway. Finally the gateway bring all RSSI values of the mobile node to PC monitoring software, the corresponding mobile node’s location is calculated. In order to reduce the error, monitoring software will collect 10 times of the RSSI value and take average on it, and then select the nearest value of the three fixed nodes. Finally the trilateral measurement method is used to calculate the location of mobile nodes.V.SYSTEM IMPLEMENTATIONAll software systems embedded in nodes are based on Z-Stack. BecauseZ-Stack is an open-source project, it is very beneficial to the secondary development. These nodes were tested in a real coal mine locate in Shanxi Province. We deployed the fixed node every 50 meters in the tunnel, and also set a fixed node in each entrance of the work area. Because the fixed node have large size digital LED displays, so the display content of the fixed node can be seen far from away the miner. Each miner carries a mobile node, the temperature and gas concentration is displayed on the LCD screen at real-time.The gateway node is placed at the entrance of the mine, through the RS232 cable connected to the monitoring computer in the control room. In this system all packets collected by the gateway node are transmitted to PC through a serial port, and it can save historical data backup to a SQL database. The main function of monitoring software is to display and store the data of every node, and calculates related mobile nodes’ location according to RSSI values. The monitoring software has two main dialog interfaces, one is used to display a two- dimensional profile of the coal mine, and user can see all the miners' working position. Another interface is data displaying interface, and environmental data were shown here. The picture of PC monitoring software is shown in Fig. 2.Figure 2. PC monitoring software.VI.SYSTEM EV ALUATIONThrough repeated testing of the system, we made the system an objective assessment. First is the power consumption assess for node hardware, fixed node’s working voltage is in 9V ~ 24V when the power supplied by cable. The maximum operating current for fixed node is 93mA; the average operating current is 92.2mA. When the power cable was disconnected, fixed node powered by lithium-ion battery. On battery power, the fixed node’s maximum working current is 147mA; average working current is 146.3mA. Fixed nodes can work 8 hours on battery power at least.Another quite important performance is the location function of the system performance. At four different locations of tunnel and working areas, mobile nodes were placed there. Two sets of different average error data were shown in From table 1. Because this system uses RSSI technology and it relies mainly on the signal strength, the signal quality will be affected by interferences. From different locations’ errors we can see that, the error in working areas was larger than it in tunnels, because the tunnel is generally straight, but the shape of the working areas are uncertainty.We gratefully acknowledge Texas Instruments for devices provided to us free of charge. And also thank staffs of XinNuoJin Company for giving us supports onsystem testing.REFERENCES[1] Xinyue Zhong Wancheng Xie. “Wireless sensor network in the coal mineenvironment monitoring“. Coal technology, 2009, Vol. 28, No. 9,pp.102-103. [2] Shouwei Gao. “ZigBee Technology Practice Guide”. Beijing: Beijing Universityof Aeronautics and Astronautics Press , 2009, pp. 27-28.[3] Yang Wang, Liusheng Huang, Wei Yang. “A Novel Real-Time CoalMinerLocalization and Tracking System Based on Self-Organized Sensor Networks”.EURASIP Journal onWireless Communications and Networking, Volume 2010, Article ID 142092.[4] Sang-il Ko, Jong-suk Choi, Byoung-hoon Kim. “Indoor Mobile LocalizationSystem and Stabilization of Localizaion Performance using Pre-filtering”.International Journal of Control, Automation and Systems, Vol. 6, No. 2, pp.204-213, April 2008.[5] .[6] Hawkins Warren, Daku Brian L. F, Prugger Arnfinn F. “Positioning inunderg round mines”. IECON 2006 - 32nd Annual Conference on IEEE Industrial Electronics, 2006, pp. 3159-3163.[7] Zhu, Shouhong, Ding, Zhiguo, Markarian Karina. “TOA based jointsynchronization and localization”. 2010 IEEE International Conference on Communications, ICC 2010, 2010, Article ID 5502036.[8] Ni Hao, Ren Guangliang, Chang Yilin. “A TDOA location scheme in OFDMbased WMANs”. IEEE Transactions on Consumer Electronics,2008, Vol. 54, No. 3, pp. 1017-1021.[9] Dogançay Kutluyil, Hmam Hatem. “Optimal angular sensor separation for AOAlocalization”. Signal Processing, 2008, Vol. 88, No. 5, pp. 1248-1260.[10] K. Aamodt. “CC2431 Location Engine”. Texas Instruments, Application NoteAN042, SWRA095.[11] Tennina Stefano, Di Renzo Marco, Graziosi Fabio, Santucci Fortunato.“Locating zigbee nodes using the tis cc2431 location engine: A testbed platform and new solutions for positioning estimation of wsns in dynamic indoor environments”. Proc Annu Int Conf Mobile Comput Networking, 2008, pp.37-42.摘要-本文介绍并设计了一个新类型的煤矿安全监控系统,它是一种基于ZigBee 技术的无线传感器网络系统。
【原创】基于ZigBee技术的智能家居安全监控系统设计毕业论文设计

基于ZigBee技术的智能家居安全监控系统设计[摘要]ZigBee是一种新兴的短距离无线通信技术,为实现对家庭安全的实时监控,提出了智能家居远程安全监控系统设计方案。
系统基于ZigBee技术和GSMGPRS网络进行设计,能够通过彩信和短信发出监控图像和报警信息,接收远程指令;同时引入了多种传感器,实现了对家用电器的远程控制,实现了智能家居远程监控。
重点阐述了系统的硬件、软件设计以及系统的性能测试,实现了多个监控装置的无线联网。
实验结果表明,所设计的系统能够实现安全、便捷的智能家居远程监控,并具有较高的可用性和可靠性,验证了ZigBee技术应用于低速个域网具有低功耗、可扩展性以及较高的实用性等特点。
[关键词]:智能家居;无线网络;ZigBee;【Abstract】ZigBee is a new kind of short distance wireless communication technology,To realize the real-time monitoring of family security, and put forward the intelligent scheme. System based on ZigBee technology and GSMGPRS network design, can through the MMS and SMS send monitoring image and alarm information, receiving remote instruction; At the same time introduced a variety of sensors, realize the and system performance test, and realize multiple monitor wireless networking. The experimental results show that the designed system can realize the safe, convenient intelligent 、ELAN、HAI(美国海益)【l】以及已经打入中国市场的Honeywell(霍尼韦尔)、LG。
基于Zigbee的智能家居环境监测系统的设计 毕业论文

智能家居监测系统的设计Design of The Intelligent Home Furnishing Mornitorning System毕业设计成绩单毕业设计任务书毕业设计开题报告摘要随着嵌入式计算、传感器、无线通信等技术的飞速发展,无线传感网被广泛应用于环境监测、军事国防和工农业控制等诸多领域,已成为电子信息技术发展的一个热点。
CC2530是TI公司针对Zigbee的无线传感网芯片解决方案,具有功耗低,可靠性高,组网简单等优势。
基于CC2530和Zigbee协议,设计了温湿度数据采集系统。
在干扰环境下测试表明,网络具有较强的鲁棒性和自组能力。
本课题主要介绍基于CC2530为核心的家庭环境监测系统的硬件电路设计和软件流程设计,实现了在家庭环境中对温度、湿度、烟雾的监测。
将温度、湿度的信息量经过单片机处理后通过无线发送给上位机。
本设计使用Zigbee无线网络协议,将系统参数传输及控制,可与上位机实时通讯和监控。
关键词:CC2530 传感器Zigbee 环境监测ABSTRACTWith the rapid development of embedded computing, sensor, wireless communication technology, wireless sensor network is widely used in environmental monitoring, military defense, industrial and agricultural control fields, has become a hotspot in the development of electronic information technology. CC2530 is a wireless sensor network chip for Zigbee TI solution, with low power consumption, high reliability, simple networking advantages. CC2530 and based on Zigbee protocol, design the temperature and humidity data acquisition system, the software algorithm coordinator and ordinary nodes are given respectively, tested in interference environment, the network has strong robustness and self-organizing ability.This paper mainly introduces the design of hardware circuit and software flow design of family environment monitoring system based on CC2530 as the core, realizes in the home environment of temperature, humidity. Among them, the analog temperature, humidity, light sensor through the SCM processing output control action corresponding adjusting the corresponding parameters; SCM outputs corresponding protection control: instantaneous over current protection. This design uses Zigbee wireless network protocol, the system parameters of transmission and control, is also available with a PC real-time communication and monitoring.Key words: CC2530 Sensor Zigbee Environmental Monitoring目录第1章绪论 (1)1.1 本文研究背景与意义 (1)1.2 智能家居环境监测系统的特点 (1)1.3 国内外发展现状及分析 (2)1.4 典型无线网络技术介绍 (2)1.4.1 Zigbee技术 (2)1.4.2 Wi-Fi技术 (3)1.4.3 蓝牙技术 (3)1.5.1 本文主要研究内容 (3)1.5.2 本文主要研究创新点 (4)第2章Zigbee技术综述 (5)2.1 Zigbee技术介绍 (5)2.2 Zigbee技术的特点 (6)2.3 Zigbee网络设备组成和网络结构 (6)2.4 Zigbee协议分析 (7)2.4.1 网络层(NWK) (7)2.4.2 应用层(APP) (8)第3章家居环境监测系统方案 (11)3.1 系统结构 (11)3.2 系统功能定义 (12)3.3 系统设计要求 (12)第4章家居环境监测系统硬件设计 (14)4.1 系统电源电路 (14)4.2 Zigbee芯片CC2530 (15)4.3 家居环境参数采集模块 (15)4.3.1 数字温湿度传感器DHT11 (15)4.3.2 烟雾传感器MQ-2 (16)4.4 CC2530通讯 (17)4.5 LCD液晶显示模块 (18)第5章系统软件设计 (19)5.1 Zigbee无线通讯协议 (19)5.2 温湿度传感器程序 (20)5.3 烟雾传感器程序 (20)第6章系统性能测试与评述 (21)6.1 硬件测试 (21)6.2 软件测试 (21)第7章结论与展望 (22)7.1 结论 (22)7.2 展望 (22)总结 (23)参考文献 (24)致谢 (25)附录 (26)附录A 外文文献 (26)附录B 中文翻译 (34)附录C 程序 (39)第1章绪论1.1 本文研究背景与意义千百年来,人类都在关注着自身的生活和居住条件,并努力改善和提高之。
ZigBee网络安全性分析

ZigBee网络安全性分析孙静【摘要】ZigBee是一项新兴的短距离无线通信技术,是一种无线个域网.介绍了ZigBee网络的安全机制,描述了ZigBee的信任中心和安全密钥,详细分析了ZigBee网路的安全建立过程,以及密钥建立协议和认证协议:SKKE和MEA协议.【期刊名称】《电脑与电信》【年(卷),期】2010(000)011【总页数】3页(P38-40)【关键词】ZibBee;安全性;TC;Key【作者】孙静【作者单位】吉林师范大学计算机学院,吉林,四平,136000【正文语种】中文1.引言ZigBee技术是一种近距离、低复杂度、低功耗、低速率、低成本的双向无线通信技术[1-3],工作在2.4GHz的ISM频段上,传输速率为20 kb/s-250 kb/s,传输距离为10m-75 m。
Zigbee网络可由多达65 000个无线数传模块组成,在整个网络范围内,它们可以相互通信,也可与现有的其它各种网络连接,范围最大达几公里[2,3],主要适合于工业控制、传感和远程控制、智能建筑等领域。
2.ZigBee网络的安全架构ZigBee标准建立在IEEE 802.15.4标准基础上,包含物理层(PHY)、媒体访问控制层(MAC)、网络层、应用层,并定义了安全服务提供机制。
物理层、媒体访问控制层则由IEEE 802.15.4标准定义。
ZigBee安全体系结构使用IEEE802.15.4的安全服务,利用这些安全服务对传输的数据进行加密处理,并提供对接入网络的设备的身份认证、密钥管理等功能。
ZigBee联盟定义的NWK、APS都包含该安全体系,他们采用128位的AES加密,CCM*模式,以及相应的密钥机制保证ZigBee网络的安全性[2,3]。
ZigBee网络的安全架构如图1所示。
图1 ZigBee的安全架构3.ZigBee网络安全分析3.1 802.15.4安全性分析IEEE802.15.4的安全机制是在MAC层实施的,应用通过在协议栈中设置恰当的参数表明采用了何种安全级,如果没有设置参数,那么默认没有采用安全措施。
zigbee网络路由算法研究与优化

由分层协议, 利用分层策略找到最短路径, 降低能耗. 李志明[3]等人则引入了差分算法对最小生命周期求解, 使路由节点选择生命周期最长的簇进行通信. 王飞[4]则 通过 GA-PSO 算法通过对簇类节点优化而找到最优路 径. Li 和 Meng[5]等人提出对 RREQ 分组的泛洪进行控 制, 从而降低能耗. 高霞、徐海峰[6,7]等则提出将没有工 作的节点进行休眠来减少网络的能耗. 通过以上的这 些研究, 给本文研究提供了理论基础. 而本文则结合传
引用格式: 黄静,陈兰.ZigBee 网络路由算法研究与优化.计算机系统应用,2019,28(10):251–256. /1003-3254/7047.html
Research and Optimization of Routing Algorithm in ZigBee Network
① 基金项目: 国家自然科学基金 (51375459) Foundation item: National Natural Science Foundation of China (51375459) 收稿时间: 2019-02-25; 修改时间: 2019-03-15; 采用时间: 2019-03-25; csa 在线出版时间: 2019-10-15
HUANG Jing, CHEN Lan (School of Information Science and Technology, Zhejiang Sci-Tech University, Hangzhou 310018, China) Abstract: At present, ZBR algorithm is widely used in ZigBee network, but after research and analysis, the energy consumption of ZBR algorithm can be greatly reduced. Therefore, an improved hierarchical energy control algorithm is proposed in this study. The improved algorithm limits the spread range of RREQ packets by controlling the energy threshold of nodes, limits the depth of the network, discards unwanted RREQ packets and reduces them. The energy consumption of the network is compared with the original algorithm in terms of end-to-end delay, residual energy and packet delivery rate through NS-2 simulation experiments. The experimental results show that the improved algorithm can ensure the stability of the network transmission, reduce the delay and energy consumption, and maximize the network lifetime. Key words: ZigBee network; ZBR; routing algorithm; layered; NS-2; energy consumption optimization
ZIGBEE对网络传输内容用AES加密

ZIGBEE对网络传输内容用AES加密AES(The Advanced Encryption Standard)是美国国家标准与技术研究所用于加密电子数据的规范。
它被预期能成为人们公认的加密包括金融、电信和政府数字信息的方法。
AES是一个新的可以用于保护电子数据的加密算法。
明确地说,AES是一个迭代的、对称密钥分组的密码,它可以使用128、192和256位密钥,并且用128位(16字节)分组加密和解密数据。
与公共密钥密码使用密钥对不同,对称密钥密码使用相同的密钥加密和解密数据。
通过分组密码返回的加密数据的位数与输入数据相同。
迭代加密使用一个循环结构,在该循环中重复置换(permutations)和替换(substitutions)输入数据。
Z-stack对Zigbee2007提供了全面的支持,功能之强大,性能稳定、安全性高。
CC2530硬件支持128bit的AES加密算法,在协议栈中为了避开相同设备的干扰,和防止被其他设备监听,就必须采用这个技术将数据加密来提高数据的安全性。
1实验目的与器材实验目的本实验将利用Z-Stack2007协议栈构建一个简单的无线传感网络,对网络上传输的数据用AES进行加密,并且通过抓包软件对加密之前和之后的数据进行分析对比。
实验器材?3个CC2530开发模块(1个终端节点,1个协调器,1个抓包节点);2实验原理与步骤本实验以SensorDemo为实例程序,说明如何对传输的数据进行AES加密。
实验原理AES是一个迭代的、对称密钥分组的密码,它可以使用128、192和256位密钥,并且用128位(16字节)分组加密和解密数据。
Z-STACK中采用的是128bit的加密方式,并且在协议栈中实现了AES加密算法。
因此,如果需要对数据进行加密,仅需要在协议栈的配置文件中提供一个密钥,并且使能AES加密即可。
通过观察发现,加密后数据的长度和原始数据的长度是相关的。
例如,当原始数据长度为1~15字节时,加密后的数据所对应的长度相同;当原始数据长度为16~31字节时,加密后的数据所对应的长度相同,以此类推。
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
Research of ZigBee’s data security and protectionLi Chunqing1, Zhang Jiancheng11College of Computer Science and Software,Tianjin Polytechnic University, NO.63 in Chenglinzhuang Road,Hedong District,Tianjin, 300160,Chinafranklcq@ABSTRACT: With the fast development of the wireless communication technology, the ZigBee technology, as a new short-distance wireless network technology, has been used much more widely in the area of wireless network. Its security meets not only confidentiality, but also low-power, low complexity, low-cost and so on. Therefore, it is particularly important to study the data security protection of ZigBee technology deeply. This paper discusses the ZigBee’s Security system, wireless data transmission network and researches on the data encryption and decryption of the ZigBee technology. A number of existent issues and the future development of ZigBee technology have been analyzed and summarized. What’s more, in order to expand the range of ZigBee’s application, it is necessary to combine the ZigBee technology with IPv6.KEYWORDS: ZigBee technology; Wireless data transmission; encryption and decryption; CCM ModelI.INTRODUCTIONThe fast development of wireless communication and electronic device technology has urged the development and the application of low power loss, the low price and the multi-purpose miniature sensor. In general, along with signal distance enlargement, the cost of the equipment complexity, the power loss as well as the system is increasing. Compared with the existing kinds of wireless communication technologies, ZigBee technology will be the technology[1] of the lowest power loss and cost. Meanwhile, because of the ZigBee technology’s low data rate and small communication range, it has made the ZigBee technology be used in the small load data current capacity business.ZigBee alliance forecasts the main application domain, including industry control, consumption electronic installation, automobile automation, agricultural automation and medical device control. In many applications, it needs high security in the sensor network. Therefore, the security problem becomes the restriction of wireless sensor network’s development. In the paper, it mainly studies the ZigBee protocol stack architecture, the security key, the network architecture as well as the trust center which uses the safety mechanism to conduct the research, and proposes the existing questions in the security aspect as well as the trend of ZigBee technology development in security aspect.II.ZIGBEE SECURITY SYSTEMThe ZigBee equipment uses the IEEE 802.15.4 wireless protocol to communicate with others. This standard assigns two: Physical Layer (PHY) and Media Access Control Layer (MAC) [2].The ZigBee protocol stack is composed of the physical layer, the data link layer, the network layer (NWK) as well as the application layer (APL)[3].Physical layer takes charge of basic wireless correspondence which is made up of modulation, transmission, data encryption and acception. The link layer provides the equipment with Single-hop Communication as well as the reliable transmission and the communication’s security. The network layer mainly provides the general network function, for example, topology building and maintenance, addressing and security route. Application layer includes application support sub-layer, ZigBee equipment object and different kinds of application objects. Application support sub-layer supplies the security and the mapping management service. ZDO (ZigBee Device Object, ZigBee equipment object) is responsible for the equipment management, including the security policy and the safe configuration management. The application layer provides services for ZDO and the ZigBee application service.2009 International Forum on Computer Science-Technology and ApplicationsThis framework of the system includes protocol stack’s three safety mechanisms. MAC, NWK and APS (the APL level including one application support sub-layer) are responsible for the respective frame’s safety transmission. Moreover, the APS sub-layer provides services for the establishment and maintenance of security relationship. ZDO manages secure strategy and equipment security structure. Figure 1 has demonstrated the ZigBee protocolstack Full View.Figure 1. ZigBee protocol stack’s security architectureZigBee uses three basic keys, respectively the network key, the link key and the host key, which are used in the data encryption process. The network key can be applied in the data link layer, the network layer and the application layer while the main key and the link key are used in the application layer and its sub-layer.III. ZIGBEE WIRELESS DATA TRANSMISSIONNETWORKThe ZigBee standard has defined three types of equipments, which are the ZigBee Coordinator, the ZigBee router and the ZigBee terminal device. The ZigBee Coordinator is responsible for starting and configuring network, only one ZigBee Coordinator in a ZigBee network. The ZigBee router is one kind of the support connection equipments. There are many routers in a network. The router can retransmit the message to other equipments, but it does not support the ZigBee router in the star network. The ZigBee terminal device may carry out the related function, and reaches other correspond equipment using the network. ZigBee network framework is shown in Figure 2.ZigBee CoordinatorZigBee RouterZigBee Terminal EquipmentFigure 2. ZigBee network architectureSimply speaking, similar to CDMA and the GSM network, ZigBee is a high reliable wireless data transmission network. ZigBee data transmission module is similar to the Mobile network base stations. To ZigBee, its effective coverage scope is from 10 meters to 75meters. However, based on the size of actual transmitting power and a varietyof different application models, its scope can be extended to be several hundred meters, which can basically cover the home or office environment. ZigBee can be a wireless data transmission network platform which is composed of a maximum of 65000 nodes. In the entire network, each ZigBee node can communicate with each other. Based on this, the transmission distance of ZigBee can be extended from the standard 75meters.Different from the mobile communication CDMA network or the GSM net, the ZigBee network is mainly established for the industrial automation control data transmission [7]. Thus, it must have the characteristics of simplicity, easy-operating, reliability and low price. Its each base value is less than 1000RMB. However, mobilecommunication webmaster is built for the audio communication. Each base station costs generally above 1,000,000 Yuan. Each ZigBee node can not only regard itself as the monitoring object, for example its sensor carries on the data acquisition and monitoring directly, but also transfer automatically the data information which another node passes on. In addition, each ZigBee node (FFD) can also wirelessly connect many isolated sub-nodes which don’t transfer the network information in its own signal cover scope.IV.DATA ENCRYPTION AND DECRYPTIONThe ZigBee technology has provided different security policies in view of the different applications[4].These strategies exert separately on the data link layer, the network layer and the application layer, using the AES2128 encryption algorithm to guarantee data security under the CCM3 pattern. The CCM3 pattern is an improvement of the CCM pattern[5], which is made up of the Cipher Block Chaining Message Authentication Code (Ci-pher Block Chaining--MAC, CBC--MAC) pattern and the counter (Counter, CTR) pattern. CCM3 pattern execution includes input transformation, authentication transformation and encryption transformation, which use the following parameters:z A bit string key, its length keylen is 128;z The length of the authentication field M (0, 4, 6, 8, 10, 12, 14, 16);z The message field length L (2, 3, ⋯, 8);z The length of m byte string territory isl(m) byte, its value scope is 0≤ l (m) < 28L;z The length of N value domain is 15 - L, for at any one range when using the same key, N value isunique;z The length of da byte string territory is l (da) byte, its value scope is 0 ≤l (da) < 264;Their concrete realization of the process is as follows:A.Input TransformationInput transformation is as follows: inputing the encryption data m and data authentication da, by these following steps:1)Make sure a byte string’s field length l(da) bytes to form L (da) bytes string.a) L (da) = 0, then L (da) for the empty string;b) 0 <l (a) <216 - 28, then L (da) will encrypt l (da) of the two bytes;c) 216 - 28≤ l(da) <232, then L (da) is 0xff, 0xfe, and the four bytes of l (a) which will be encrypted to the right connection;d) 232≤ l (da) <264, then L (da) is 0xff, 0xff, and the8 bytes of l (da) which will be encrypted to the right connection.2) L (da), right to connect da forms the result string.3) Using the result string to form an additional authentication data (AddAtData), the Data is produced by right connection to non-negative zero; the additional data can be divided by 16.4) Using the same method to form an additional message data (PlainData), the data is formed by the way of connecting encrypted data m right to non-negative zero, the additional data must be divided by 16.5) Finally, authentication data (AuthData) is generated, which is composed of the data AddAtData and data PlainData, that is, To AuthData = AddAtData‖PlainData.B.Authentication TransformationAfter Data AuthData generated, transform it with signs. Their concrete realization of the process is as follows:1) to form a byte flag field (Flags), which is made up of 1 bit express reservation (Reserved), 1 bit Hdata, 3 bits M, and 3 bits L, namely: Flags = Reserved ‖ Hdata ‖M ‖ L.In the formula, 1 bit “Reserved” is used for future expansion when set to 0; when l (a) = 0 , a Adata will be set to 0, otherwise, will be set to 1; 3 L domains stand for an integer L - 1; when M> 0, 3 M domain stand for an integer (M - 2) / 2, otherwise, set to 0.2) generate 16 bytes B0 field, which is made up of 1 byte flag field (Flags), 15 - L bytes N domain and L bytes that is the length of the l (m) domain, namely: B0 = Flags ‖ N ‖ l (m).3) separate data AuthData into A1‖A2‖⋯‖At, where each data block is a 16-byte string, then the CBC-MAC value is defined as:X 0 = 0128, Xi + 1: = E(Xi⊕Ai,Key) f or i = 0, ⋯, tE(X,K) that the use of key K to encrypt the plaintext X by the function E; 0128 stand for that all the 16 bytes is 0. Then Seeking reauthentication mark T, which is a MAC value, by obtaining the front M bytes of the ciphertext Xi + 1, namely: T: = first-M-bytes (Xi + 1).C.Encryption TransformationWhen plaintext data (PlainData) and authentication flagT have been established, the process of using encrypt transformation to encryption is as follows:1) Generate a byte flag field (Flags), which is made up of 2 bits expressed reservations (Reserved), 3 integer bits 0 and 3 bits integer domain L, namely: Flags = Reserved ‖Reserved ‖ 0 ‖L .In the formula, 2 bits “Reserved” are used for future expansion when set to 0, 3 integer bits express L-1 and 3 bits zero domain express L;2) Generate 16 bytes Ai field, which is made up of 1 bits expressed byte flag field (Flags), 15-N bytes N domain and L bytes expressed integer i, namely:Ai = Flags ‖N‖ Counter i for i = 0, 1, 2 ⋯3) separate message data PlainData into M1‖M2‖⋯‖M t, where each message block Mi is a 16 b ytes string .ciphertext blocks C1, ⋯, Ct are defined as: Ci: = E(Ai, Key)⊕Mi for i = 1, 2, ⋯, t.4) Ciphertext comes from the left l (m) bytes of C1‖C2‖⋯‖Ct.5) Find the 16 bytes encryption blocks S0as: S0: = E(A0,Key ).6) Encrypted authentication symbol U is gained by the dense flow of Chi U of S0 with the left-most M-byte XOR authentication flag T . The specific value is as follows: U: = T⊕first-M-bytes (S0)If this operation is right, encrypted message c can be made up of connecting the ciphertext right to Encrypted authentication symbol, the last is output.D. Decryption TransformationAfter obtaining the encryption key K, the length of the M authentication domain and encryption message msg, you can decrypt the cipher text, the process is as follows:1) Resolve the receiving message msg into E‖U. The right-most string U is a M bytes string. If this operation fails, the output will be invalid and stopped. U is the encrypted authentication symbol; the length of left string E is l(msg) - M bytes.2) Generate an additional message CipherData. It is generated by the way of right connecting string C and non-negative zero. CipherData can be divisible by 16.3) Similarly, use encryption transformation process; enter the demand parameters “CipherData” and authentication symbol. Here, the decomposition of Ciphertext message is CipherData, it is broken down into each block Ci which is a 16 bytes string.4) The output string is N‖T. The right-most string Tis a M bytes string. T is the authentication mark.The l (msg )- M bytes string of the left-most string N is regarded as the output of the plaintext message.In short, ZigBee technology can ensure transmission of information security and prevent eavesdropping or interception of the attacker by utilizing a security policy. Thereby, it ensures the security of wireless transmission.V.CONCLUSIONThe key success of ZigBee technology is its abundance and convenient application. In security aspect, Literature [6] think the AES-128 encryption algorithms can ensure the data security of the ZigBee wireless transmission. Moreover, NIST also estimates that the AES - 128 encryptions can be at least used safely till year 2036[7]. But literature[8] think the sole symmetrical encryption algorithm possibly brings the security hidden danger in the data encryption and the key exchange. In view of this, the author has proposed an improved data encryption and decryption algorithm in order to ensure the data security of the ZigBee wireless transmission, on the base of the analysis of ZigBee security system and network structure. Meanwhile, the author suggests the elliptic curve public-key encryption method should be applied in ZigBee technology as non-symmetric plan[9].Because there is a huge address spaces in IPv6, so it can assign a global network address for each ZigBee node. Meanwhile, it can provide good QoS and safe communication support. Therefore, the combination of IPv6 and the ZigBee will be a hot spot in the future study.REFERENCES[1]Quanping Wang, Li Wang.The introduction of ZigBeetechnology[J].COMMUNICATIONS WORLD,2003,4(101):41--43.[2]Xiaopei Nie. The Analysis of ZigBee Standard’s SecurityServices Architecture[J]. Net Security Technologies andApplication,2009,2:43-45.[3]Lihua Xu,Yihuai Wang. The Design And Realize Of A ZigBeenetwork[J]. Control & Automation , 2007,23(11-2):72-73.[4]Xiuli Ren,Haibin Y u. Security Analysis for Wireless SensorNetworks Based on ZigBee[J]. Computer Science,200--6,33(10):111-113.[5]Housley R,Whiting D , Ferguson N. Counter with CBC--MAC(CCM) [DB/OL]. /groups/ST/toolkit/B--CM/documents/proposedmodes/ccm/ccm.pdf,Viewed on August3, 2009.[6]Ferguson N,Schneier B.Practical cryptography[M].NewYork:John Wiley and Sons,2003:97-120.[7]Krasner J. Using Elliptic Curve Cryptography( ECC) forEnhanced Embedded Security [EB/ OL],2004. http://embedded-/EMF-ECC-FINAL1204.pdf, Viewed on August 3,2009.[8]Ondrej H, Peter K, Petr F, et al.On security of PAN wirelesssystems[C].In Proc of 6th International Workshop on EmbeddedComputer Systems (SAMOS 2006),LNCS,V ol.4017. [s.l.]:Sp--ringerVerlag,2006:178-185.[9]Pereira R. ZigBee and ECC Secure Wireless Networks[EB/OL].2004. /Articles/ArticleID/83--69/8369.html, Viewed on August 3, 2009.。