We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

A Survey of ZigBee Wireless Sensor Network Technology: Topology, Applications and Challenges

by Omojokun G. Aju
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 130 - Number 9
Year of Publication: 2015
Authors: Omojokun G. Aju
10.5120/ijca2015907130

Omojokun G. Aju . A Survey of ZigBee Wireless Sensor Network Technology: Topology, Applications and Challenges. International Journal of Computer Applications. 130, 9 ( November 2015), 47-55. DOI=10.5120/ijca2015907130

@article{ 10.5120/ijca2015907130,
author = { Omojokun G. Aju },
title = { A Survey of ZigBee Wireless Sensor Network Technology: Topology, Applications and Challenges },
journal = { International Journal of Computer Applications },
issue_date = { November 2015 },
volume = { 130 },
number = { 9 },
month = { November },
year = { 2015 },
issn = { 0975-8887 },
pages = { 47-55 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume130/number9/23241-2015907130/ },
doi = { 10.5120/ijca2015907130 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:24:58.526626+05:30
%A Omojokun G. Aju
%T A Survey of ZigBee Wireless Sensor Network Technology: Topology, Applications and Challenges
%J International Journal of Computer Applications
%@ 0975-8887
%V 130
%N 9
%P 47-55
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

ZigBee technology as a wireless sensor and control network is one of the most popularly deployed wireless technologies in recent years. This is because ZigBee is an open standard lightweight, low-cost, low-speed, low-power protocol that allows true operability between systems. It is built on existing IEEE 802.15.4 protocol and therefore combines the IEEE 802.15.4 features and newly added features to meet required functionalities thereby finding applications in wide variety of wireless personal area networked systems such as home/industrial automation and monitoring systems. Although the ZigBee design specification includes security features to protect data communication confidentiality and integrity, however, when simplicity and low-cost are the major goals, security suffers. This paper gives the general survey of the ZigBee as a wireless sensor network based technology which provides the readers with the general overview of ZigBee network technology including its topology, applications and challenges.

References
  1. ZigBee Alliance.: Low-Power, IPv6 Networking for Home Energy Management. (2014). (Online). ZigBee Press, California. Available at: http://www.zigbee.org/920ip-low-power-ipv6-networking-for-home-energy-management-by-zigbee-alliance/ (Accessed 20 September, 2015).
  2. Abbagnale, A, Cipollone, E, Cuomo, F.: A case study for evaluating IEEE 802.15.4 wireless sensor network formation with mobile sinks, IEEE ICC, Rome. (2009)
  3. ANT.: Multi-Channel Design Considerations. (2012). (online). Dynastream Innovations Inc., Alberta. Available at: file:///C:/Users/Owner/Downloads/ANT_AN15_Multi_Channel_Design_Considerations%20(1).pdf (Accessed 23 July, 2015).
  4. Bell, B. S, Kanar, A. M, Kozlowski, S. W.: Current issues and future directions in simulation-based training in North America. The International Journal of Human Resource Management, Vol. 19, 1416–1436. (2008)
  5. Bluetooth T M.: Specification of the Bluetooth System; Bluetooth SIG Inc., Kirkland. (2005)
  6. Blum, B. M.: ZigBee and ZigBee PRO: Which feature set is right for you? EE Times. (2008). [online]. Available at: http://www.eetimes.com/design/microwave-rf- design/4019000/ZigBee-and-ZigBee-PRO-Which-feature-set-is-right-for-you- (Accessed 8 June, 2015)
  7. Bowers, B.: ZigBee Wireless Security: A New Age Penetration Tester’s Toolkit. Cisco Press, (2012). (Online): Cisco Press. [Online]. Available at: http://www.ciscopress.com/articles/article.asp?p=1823368&seqNum=4 (Accessed 2 July, 2015).
  8. Buratti, C, Conti, A, Dardari, D.: 2009. An overview on wireless sensor networks technology and evolution. (Online). (2009). Sensors 2009.9. 6869-6896. (2009)
  9. Cache, J, Wright, J, Liu, V.: Hacking Exposed Wireless: Wireless Security Secrets and Solutions. (2nd ed). McGraw Hill, London. (2010)
  10. Chandane, M, Bhirud, S, Bonde, S.: Performance Analysis of IEEE 802.15.4. International Journal of Computer Applications, (e-journal). Vol.40, No.5. (2012)
  11. Dargie, W, Poellabauer, C.: Fundamentals of wireless sensor networks: theory and practice. (e-book). John Wiley & Sons Inc., New Jersey. (2010)
  12. Johnstone, M. N, Jarvis, J. A.: Penetration of ZigBee-based Wireless Sensor Networks. A Proceeding of Australian information Warfare and Security Conferenece. (Online). (2011). Available at: http://ro.ecu.edu.au/cgi/viewcontent.cgi?article=1044&context=isw (Accessed 25 August, 2015).
  13. Kalita, H.K, Kar, A.: 2009. Wireless Sensor Network Security Analysis. International Journal of Next-Generation Networks (IJNGN). (e-journal), (2009). Vol.1, No 1. 1-10.
  14. Karl, H, Willing, A.: 2007. Protocols And Architectures For Wireless Sensor Networks. John Wiley & Sons, New Jersey. (2007).
  15. Kim, H, Caytiles, R.D, Kim, T.: Design of an Effective WSN-Based Interactive u-Learning Model. International Journal of Distributed Sensor Networks, (e-journal). (2012).
  16. Knight, M.: Wireless security-How safe is Z-wave?. Computing & Control Engineering Journal, (e-journal). (2006). Vol. 17, No. 6. 18-23.
  17. Ruiz-Garcia, L.: 2009. A review of wireless sensor technologies and applications in agriculture and food industry: state of the art and current trends. Sensors, Vol. 9, No. 6. 4728-4750. (2009)
  18. Shelby, Z, Bormann, C.: 6LoWPAN: The Wireless Embedded Internet. John Wiley & Sons, New Jersey. (2009)
  19. Silva, I, Guedes, L, Portugal, P, Vasques, F.: Reliability and Availability Evaluation of Wireless Sensor Networks for Industrial Applications. Sensors, Vol. 12, No. 1. 806-838. (2012)
  20. IEEE 802.15.4 Standard. Part 15.4: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for Low-Rate Wireless Personal Area Networks (LR-WPANs) IEEE; Piscataway, New Jersey. (2006)
  21. Loukas, G., Oke, G, Gelenbe, E.: Defending against Denial of Service in a Self-Aware Network: A Practical Approach. NATO Symposium on Information Assurance for Emerging and Future Military Systems. Ljubljana, Slovenia.(2008)
  22. Radmand, P.: ZigBee/ZigBee PRO security assessment based on compromised cryptographic keys. Proceeding of International Conference on P2P, Parallel, Grid, Cloud and Internet Computing. (2010). 465-470
  23. SNRG.: Smart Network Research Group. (Online), (2012). Available at: http://www.pafkiet.edu.pk/ Default.aspx?tabid=696 (Accessed 24 August 2015].
Index Terms

Computer Science
Information Sciences

Keywords

ZigBee IEEE 802.14.5 Wireless Sensor Network (WSN) topology application wireless technology.