A Design of Z-Stack Application Based on the IEEE Address

2013 ◽  
Vol 401-403 ◽  
pp. 1272-1277
Author(s):  
Wen Wu Hua ◽  
Zhong Hu Yuan ◽  
Xiu Zhen Yu

This paper has designed a ZigBee application which is based on the IEEE address. This applications operating environment is TIs protocol stack called Z-Stack. The application can realize the following functions: wireless network self-organizing, the automatic acquisition and information upload. The upper machine communication protocol uses the IEEE address as device ID. This insures the application can find the datas physical source. With the help of network address, the applications speed and any other performance indicators will not drop. Using this application, the user can immediately find the accurate position directly after the security problem appeared. It has improved the efficiency of the wireless network management obviously.

2012 ◽  
Vol 241-244 ◽  
pp. 2504-2509
Author(s):  
Yan Li ◽  
Qiao Xiang Gu

The equipment, called detection platform of the cylinders, is used for detecting cylinders so that cylinders can be at ease use. In order to transmit the real-time detection data to PC for further processing, the platform should be connected with PC. Cable connection, in some production and environmental conditions, is limited. Under the circumstance, building wireless network is the better choice. Through comparative studying, ZigBee is chosen to be the technology for building wireless network. ZigBee chip and ZigBee2006 protocol stack are the core components in the ZigBee nodes.


Author(s):  
Alekha Kumar Mishra

Most of the applications of wireless sensor networks have critical tasks to be fulfilled; thus they must be secured. Recent studies focus on securing the communication between sensors and with the base station. An adversary can launch various types of attack on WSN depending on its ability and objective. These attacks can be broadly classified into two categories: 1) layer-dependent, and 2) layer-independent. Layer-dependent attacks are specific to communication protocol layers. They mostly target a node's functionality such as routing, availability, time synchronization, and data aggregation. Layer-independent attacks are not restricted to any communication protocol layers. These attacks can be launched independent of the communication protocol stack. In this chapter, we study the various attacks possessed by WSN and classify them based on their strength, action, security requirements and impact at different layers of WSN. We define metrics to evaluate the characteristic, behavior, and dependency of these attacks followed a discussion on various counter-measures to defend them.


IEEE Network ◽  
2011 ◽  
Vol 25 (6) ◽  
pp. 41-49 ◽  
Author(s):  
Kostas Tsagkaris ◽  
Panagiotis Vlacheas ◽  
George Athanasiou ◽  
Vera Stavroulaki ◽  
Stanislav Filin ◽  
...  

2014 ◽  
Vol 687-691 ◽  
pp. 3679-3685
Author(s):  
Jian Wang ◽  
Xiao Ming Hu ◽  
Yin Chun Yang ◽  
Xiu Mei Wu

Wireless sensor networks are widely deployed and thus are suffering increasing threats such as reactive bit jamming attacks. Such jamming can be alleviated by coded transmissions. This paper derives an optimal redundancy level required for Reed-Solomon code based transmissions and unveils the monotonic characteristic of coded transmission efficiency with respect to frame size, jamming strength, as well as communication protocol stack overhead.


2014 ◽  
Vol 556-562 ◽  
pp. 6340-6343
Author(s):  
Xiao Yan Sun ◽  
Zeng Hua Zhang ◽  
Chun Long Li ◽  
Zhi Huang ◽  
Xiang Qun Wang ◽  
...  

This paper analyzes the limitations of simple network management protocol (SNMP) which adopts the centralized service model, discusses the basic idea of AgentX frame and the agent’s operating principle, and has a brief analysis on AgentX protocol packets. Based on my experiences, the paper describes the implementation of MasterAgent/ SubAgent based on AgentX communication protocol, using the related source-packet.


Sensors ◽  
2020 ◽  
Vol 20 (3) ◽  
pp. 861
Author(s):  
Bogdan Oniga ◽  
Leon Denis ◽  
Vasile Dadarlat ◽  
Adrian Munteanu

The Internet of Things (IoT) domain presents a wide spectrum of technologies for building IoT applications. The requirements are varying from one application to another granting uniqueness to each IoT system. Each application demands custom implementations to achieve efficient, secure and cost-effective environments. They pose a set of properties that cannot be addressed by a single-based protocol IoT network. Such properties are achievable by designing a heterogeneous IoT system, which integrates diverse IoT protocols and provides a network management solution to efficiently manage the system components. This paper proposes an IoT message-based communication model applied atop the IoT protocols in order to achieve functional scalability and network management transparency agnostic to the employed communication protocol. The paper evaluates the proposed communication model and proves its functional scalability in a heterogeneous IoT system. The experimental assessment compares the payload size of the proposed system with respect to the LwM2M standard, a protocol designed specifically for IoT applications. In addition, the paper discusses the energy consumption introduced by the proposed model as well as the options available to reduce such impact.


Sign in / Sign up

Export Citation Format

Share Document