Abstract
In today’s era, Internet of Things (IoT) is playing the major role, as people are becoming more dependent on smart devices. Nowadays, the concept of smart homes, smart cities, and smart health care are becoming necessary. With the help of smart health care, people living in the remote area will get the immediate assistance from the doctors, also the smart devices like smart bands, fit bit, or trackers will help to monitor the heart rate, blood pressure, etc. So, to implement these things, IoT requires some protocols; in this paper, we are going to study about a very important protocol of IoT which is ZigBee, it is a low power consuming wireless protocol. It is helpful in implementing the concept of smart city, smart homes, etc. In this paper, we have discussed about the ZigBee stack, its security, and its comparison with Bluetooth and Wi-Fi, so that a conclusion can be drawn as which protocol is most suited for IoT applications.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Muthu Ramya C, Shanmugaraj M, Prabakaran R (2011) Study on ZigBee technology, Research Gate, Conference Paper. Uploaded on 17 February 2019
Dini G, Tiloca M (2010) Considerations on security in ZigBee networks. In: 2010 IEEE international conference on sensor networks, ubiquitous, and trustworthy computing. Newport Beach, CA, pp 58–65. https://doi.org/10.1109/SUTC.2010.15.
Bakhache B, Ghazal JM, Assad SE (2014) Improvement of the Security of ZigBee by a New Chaotic Algorithm. IEEE Syst J 8(4):1024–1033. https://doi.org/10.1109/JSYST.2013.2246011
Whitehurst LN, Andel TR, McDonald JT (2014) Exploring security in ZigBee networks. In: CISR ‘14: Proceedings of the 9th annual cyber and information security research conference April 2014. pp 25–28. https://doi.org/10.1145/2602087.2602090
Kulkarni S, Ghosh U, Pasupuleti H (2015) Considering security for ZigBee protocol using message authentication code. In: 2015 annual IEEE India conference (INDICON). New Delhi, pp. 1–6. https://doi.org/10.1109/INDICON.2015.7443625
Al-alak S, Ahmed Z, Abdullah A, Subramiam S (2011) Aes and ecc mixed for zigbee wireless sensor security. Computing 1:5
Sohel Rana SM, Halim MA, Kabir MH (2018) Design and implementation of a security improvement framework of Zigbee network for intelligent monitoring in IoT platform. Appl Sci 8(11):2305. https://doi.org/10.3390/app8112305
Khan MA, Khan A, Kabir M (2016) Comparison among short range wireless networks: Bluetooth, Zigbee, & Wi-fi. Adv Comput Sci Eng 4:19–28
Pothuganti K, Chitneni A (2014) A comparative study of wireless protocols: Bluetooth. UWB, ZigBee, and Wi-Fi. 4:655–662
https://www.assured-systems.com/uk/news/article/what-is-a-zigbee-network/
Fredeady Hands-on ZigBee: implementing 802.15.4 with microcontrollers
Yuksel E, Nielson HR, Nielson F (2008) ZigBee-2007 security essentials. Informatics and Mathematical Modelling, Technical University of Denmark Richard Petersens Plads Bldg 321, dk-2800 Kongens Lyngby, Denmark
Farahani S (2008) ZigBee wireless networks and transceivers. EBook, Published on December 2008
Sahni K, Kharb L (2019) ZigBee technology: a global standard for communication. Int Educ Appl Res J 3(3)
Baronti P, Pillai P, Chook V, Chessa S, Gotta A, Hu YF Wireless sensor networks: a survey on the state of the art and the 802.15.4 and ZigBee standards
Le KT (2004) Designing a ZigBee-ready IEEE 802.15.4-compliant radio transceiver. Chipcon
Protocols and architectures for wireless sensor networks holger karl university of paderborn, germany andreas willig hasso-plattnerinstitute at the university of potsdam, Germany, https://profsite.um.ac.ir/~hyaghmae/ACN/WSNbook.pdf, EBook.
Arrigault S, Zacharaki V Design of a ZigBee magnetic sensor node. Master of Science thesis
Part 15.4: wireless medium access control (MAC) and physical layer (PHY) specifications for low-rate wireless personal area networks (LR-WPANs). Sponsor LAN/MAN Standards Committee of the IEEE Computer Society
Kumar A, Gupta S (2013) Study on ZigBee technology. Int J Eng Sci Res Technol. October 2013. Impact Factor: 1.852, ISSN: 2277-9655
Razouka W, Crosby GV, Sekkakia A (2014) New security approach for ZigBee weaknesses, the UI international symposium on applications of Ad hoc and sensor networks (AASNET’14). Procedia Comput Sci 37:376–381
Khanji S, Iqbal F, Hung P (2019) ZigBee security vulnerabilities: exploration and evaluating. Conference Paper
Borisov N, Goldberg I, Wagner D (2011) Intercepting mobile communications: the insecurity of 802.11. In: Proceedings of the 7th annual international conference on mobile computing and networking, ACM (2001). pp 180–189
Clavier C (2007) Passive and active combined attacks on AES. In: Fault diagnosis and tolerance in cryptography
Masica K (2007) Recommended practices guide for securing ZigBee wireless networks in process control system environments
Nabeel M, Zage J, Kerr S et al (2012) Cryptographic key management for smart power grids—approaches and issues
Saponara S, Bacchillone T (2012) Network architecture, security issues, and hardware implementation of a home area network for smart grid. J Comput Netw Commun 2012
Stelte B, Rodosek GD (2013) Thwarting attacks on ZigBee—removal of the killerbee stringer. pp 219–226
Li H, Jia Z, Xue X (2010) Application and analysis of ZigBee security services specification. In: 2010 Second international conference on networks security wireless communications and trusted computing (NSWCTC), vol 2. pp 494–497
Baig F, Beg S, Khan MF (2013) Zigbee based home appliances controlling through spoken commands using handheld devices. Int J Smart Home 7(1):19–26
Lee K, Lee J, Zhang B, Kim J, Shin Y (2009) An enhanced trust center based authentication in Zigbee networks. In: International conference on information security and assurance. Springer, pp 471–484
Dhillon P, Sadawarti H (2014) A review paper on ZigBee (IEEE 802.15.4) Standard. Int J Eng Res Technol (IJERT). ISSN: 2278-0181
Ali B, Awad DAI (2018) Cyber and physical security vulnerability assessment for IoT-based smart homes. Sensors 18:817
Betzler A, Gomez C, Demirkol I, Paradells J (2014) A holistic approach to Zigbee performance enhancement for home automation networks. Sensors 14:14932–14970
Kocher IS, Chow C-O, Ishii H, Zia TA (2013) Threat models and security issues in wireless sensor networks. Int J Comput Theory Eng 5:5
Kumar NVR, Bhuvana C, Anushya S (2017) Comparison of ZigBee and Bluetooth wireless technologies-survey. In: 2017 international conference on information communication and embedded systems (ICICES). Chennai, pp 1–4. https://doi.org/10.1109/ICICES.2017.8070716
Chhabra N (2013) Comparative analysis of different wireless technologies. Int J Sci Res Netw Secur Commun 1(5). ISSN: 2321-3256
Lee J-S, Su Y-W, Shen C-C A comparative study of wireless protocols: Bluetooth, UWB, ZigBee, and Wi-Fi. In: Information and Communications. Research Labs Industrial Technology Research Institute (ITRI) Hsinchu, Taiwan
Georgakakis E, Nikolidakis SA, Vergados DD, Douligeris C (2011) An analysis of Bluetooth, Zigbee and Bluetooth low energy and their use in WBANs. In: Lin JC, Nikita KS (eds) Wireless mobile communication and healthcare. MobiHealth 2010. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 55. Springer, Berlin, Heidelberg
Idris Y, Muhammad NA A comparative study of wireless communication protocols: Zigbee vs Bluetooth. IJESC 6(4). https://doi.org/10.4010/2016.867. ISSN: 2321 3361
Baker N (2005) ZigBee and Bluetooth: strengths and weaknesses for industrial applications. IEE Comput Control Eng 16(2):20–25
Mihajlov B, Bogdanoski M (2011) Overview and analysis of the performances of ZigBee based wireless sensor networks. Int J Comput Appl (0975–8887) 29(12)
ZigBee Alliance (2009) ZigBee technical document [Online]. Available: https://www.zigbee.org/Products/TechnicalDocumentsDownload
Lee J, Su Y, Shen C (2007) A comparative study of wireless protocols: Bluetooth, UWB, ZigBee, and Wi-Fi. In: The 33rd annual conference of the IEEE industrial electronics society (IECON). Taipei, Taiwan, 5–8 November 2007
Didla S, Ault A, Bagchi S (2008) Optimizing AES for embedded devices and wireless sensor networks. In: TridentCom ‘08: proceedings of the 4th international conference on testbeds and research infrastructures for the development of networks and communities. Article No.: 4, pp 1–10
Kwon Y, Kim H (2012) Efficient group key management of ZigBee network for home automation. In: 2012 IEEE international conference on consumer electronics (ICCE). IEEE, pp 378–379
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Gupta, M., Singh, S. (2021). A Survey on the ZigBee Protocol, It’s Security in Internet of Things (IoT) and Comparison of ZigBee with Bluetooth and Wi-Fi. In: Gao, XZ., Kumar, R., Srivastava, S., Soni, B.P. (eds) Applications of Artificial Intelligence in Engineering. Algorithms for Intelligent Systems. Springer, Singapore. https://doi.org/10.1007/978-981-33-4604-8_38
Download citation
DOI: https://doi.org/10.1007/978-981-33-4604-8_38
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-33-4603-1
Online ISBN: 978-981-33-4604-8
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)