Skip to main content

A Survey on the ZigBee Protocol, It’s Security in Internet of Things (IoT) and Comparison of ZigBee with Bluetooth and Wi-Fi

  • Conference paper
  • First Online:

Part of the book series: Algorithms for Intelligent Systems ((AIS))

Abstract

In today’s era, Internet of Things (IoT) is playing the major role, as people are becoming more dependent on smart devices. Nowadays, the concept of smart homes, smart cities, and smart health care are becoming necessary. With the help of smart health care, people living in the remote area will get the immediate assistance from the doctors, also the smart devices like smart bands, fit bit, or trackers will help to monitor the heart rate, blood pressure, etc. So, to implement these things, IoT requires some protocols; in this paper, we are going to study about a very important protocol of IoT which is ZigBee, it is a low power consuming wireless protocol. It is helpful in implementing the concept of smart city, smart homes, etc. In this paper, we have discussed about the ZigBee stack, its security, and its comparison with Bluetooth and Wi-Fi, so that a conclusion can be drawn as which protocol is most suited for IoT applications.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   229.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   299.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   299.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Muthu Ramya C, Shanmugaraj M, Prabakaran R (2011) Study on ZigBee technology, Research Gate, Conference Paper. Uploaded on 17 February 2019

    Google Scholar 

  2. Dini G, Tiloca M (2010) Considerations on security in ZigBee networks. In: 2010 IEEE international conference on sensor networks, ubiquitous, and trustworthy computing. Newport Beach, CA, pp 58–65. https://doi.org/10.1109/SUTC.2010.15.

  3. Bakhache B, Ghazal JM, Assad SE (2014) Improvement of the Security of ZigBee by a New Chaotic Algorithm. IEEE Syst J 8(4):1024–1033. https://doi.org/10.1109/JSYST.2013.2246011

    Article  Google Scholar 

  4. Whitehurst LN, Andel TR, McDonald JT (2014) Exploring security in ZigBee networks. In: CISR ‘14: Proceedings of the 9th annual cyber and information security research conference April 2014. pp 25–28. https://doi.org/10.1145/2602087.2602090

  5. Kulkarni S, Ghosh U, Pasupuleti H (2015) Considering security for ZigBee protocol using message authentication code. In: 2015 annual IEEE India conference (INDICON). New Delhi, pp. 1–6. https://doi.org/10.1109/INDICON.2015.7443625

  6. Al-alak S, Ahmed Z, Abdullah A, Subramiam S (2011) Aes and ecc mixed for zigbee wireless sensor security. Computing 1:5

    Google Scholar 

  7. Sohel Rana SM, Halim MA, Kabir MH (2018) Design and implementation of a security improvement framework of Zigbee network for intelligent monitoring in IoT platform. Appl Sci 8(11):2305. https://doi.org/10.3390/app8112305

    Article  Google Scholar 

  8. Khan MA, Khan A, Kabir M (2016) Comparison among short range wireless networks: Bluetooth, Zigbee, & Wi-fi. Adv Comput Sci Eng 4:19–28

    Google Scholar 

  9. Pothuganti K, Chitneni A (2014) A comparative study of wireless protocols: Bluetooth. UWB, ZigBee, and Wi-Fi. 4:655–662

    Google Scholar 

  10. https://www.digi.com/solutions/by-technology/zigbee-wireless-standard#:~:text=Zigbee%20is%20a%20wireless%20technology,900%20MHz%20and%20868%20MHz

  11. https://www.assured-systems.com/uk/news/article/what-is-a-zigbee-network/

  12. https://en.wikipedia.org/wiki/Zigbee

  13. Fredeady Hands-on ZigBee: implementing 802.15.4 with microcontrollers

    Google Scholar 

  14. Yuksel E, Nielson HR, Nielson F (2008) ZigBee-2007 security essentials. Informatics and Mathematical Modelling, Technical University of Denmark Richard Petersens Plads Bldg 321, dk-2800 Kongens Lyngby, Denmark

    Google Scholar 

  15. Farahani S (2008) ZigBee wireless networks and transceivers. EBook, Published on December 2008

    Google Scholar 

  16. Sahni K, Kharb L (2019) ZigBee technology: a global standard for communication. Int Educ Appl Res J 3(3)

    Google Scholar 

  17. Baronti P, Pillai P, Chook V, Chessa S, Gotta A, Hu YF Wireless sensor networks: a survey on the state of the art and the 802.15.4 and ZigBee standards

    Google Scholar 

  18. Le KT (2004) Designing a ZigBee-ready IEEE 802.15.4-compliant radio transceiver. Chipcon

    Google Scholar 

  19. Protocols and architectures for wireless sensor networks holger karl university of paderborn, germany andreas willig hasso-plattnerinstitute at the university of potsdam, Germany, https://profsite.um.ac.ir/~hyaghmae/ACN/WSNbook.pdf, EBook.

  20. Arrigault S, Zacharaki V Design of a ZigBee magnetic sensor node. Master of Science thesis

    Google Scholar 

  21. Part 15.4: wireless medium access control (MAC) and physical layer (PHY) specifications for low-rate wireless personal area networks (LR-WPANs). Sponsor LAN/MAN Standards Committee of the IEEE Computer Society

    Google Scholar 

  22. https://www.abiresearch.com/research/1003283

  23. Kumar A, Gupta S (2013) Study on ZigBee technology. Int J Eng Sci Res Technol. October 2013. Impact Factor: 1.852, ISSN: 2277-9655

    Google Scholar 

  24. Razouka W, Crosby GV, Sekkakia A (2014) New security approach for ZigBee weaknesses, the UI international symposium on applications of Ad hoc and sensor networks (AASNET’14). Procedia Comput Sci 37:376–381

    Article  Google Scholar 

  25. Khanji S, Iqbal F, Hung P (2019) ZigBee security vulnerabilities: exploration and evaluating. Conference Paper

    Google Scholar 

  26. https://www.ZigBee.org.

  27. Borisov N, Goldberg I, Wagner D (2011) Intercepting mobile communications: the insecurity of 802.11. In: Proceedings of the 7th annual international conference on mobile computing and networking, ACM (2001). pp 180–189

    Google Scholar 

  28. Clavier C (2007) Passive and active combined attacks on AES. In: Fault diagnosis and tolerance in cryptography

    Google Scholar 

  29. Masica K (2007) Recommended practices guide for securing ZigBee wireless networks in process control system environments

    Google Scholar 

  30. Nabeel M, Zage J, Kerr S et al (2012) Cryptographic key management for smart power grids—approaches and issues

    Google Scholar 

  31. Saponara S, Bacchillone T (2012) Network architecture, security issues, and hardware implementation of a home area network for smart grid. J Comput Netw Commun 2012

    Google Scholar 

  32. Stelte B, Rodosek GD (2013) Thwarting attacks on ZigBee—removal of the killerbee stringer. pp 219–226

    Google Scholar 

  33. Li H, Jia Z, Xue X (2010) Application and analysis of ZigBee security services specification. In: 2010 Second international conference on networks security wireless communications and trusted computing (NSWCTC), vol 2. pp 494–497

    Google Scholar 

  34. Baig F, Beg S, Khan MF (2013) Zigbee based home appliances controlling through spoken commands using handheld devices. Int J Smart Home 7(1):19–26

    Google Scholar 

  35. Lee K, Lee J, Zhang B, Kim J, Shin Y (2009) An enhanced trust center based authentication in Zigbee networks. In: International conference on information security and assurance. Springer, pp 471–484

    Google Scholar 

  36. Dhillon P, Sadawarti H (2014) A review paper on ZigBee (IEEE 802.15.4) Standard. Int J Eng Res Technol (IJERT). ISSN: 2278-0181

    Google Scholar 

  37. Ali B, Awad DAI (2018) Cyber and physical security vulnerability assessment for IoT-based smart homes. Sensors 18:817

    Article  Google Scholar 

  38. Betzler A, Gomez C, Demirkol I, Paradells J (2014) A holistic approach to Zigbee performance enhancement for home automation networks. Sensors 14:14932–14970

    Article  Google Scholar 

  39. Kocher IS, Chow C-O, Ishii H, Zia TA (2013) Threat models and security issues in wireless sensor networks. Int J Comput Theory Eng 5:5

    Google Scholar 

  40. Kumar NVR, Bhuvana C, Anushya S (2017) Comparison of ZigBee and Bluetooth wireless technologies-survey. In: 2017 international conference on information communication and embedded systems (ICICES). Chennai, pp 1–4. https://doi.org/10.1109/ICICES.2017.8070716

  41. Chhabra N (2013) Comparative analysis of different wireless technologies. Int J Sci Res Netw Secur Commun 1(5). ISSN: 2321-3256

    Google Scholar 

  42. Lee J-S, Su Y-W, Shen C-C A comparative study of wireless protocols: Bluetooth, UWB, ZigBee, and Wi-Fi. In: Information and Communications. Research Labs Industrial Technology Research Institute (ITRI) Hsinchu, Taiwan

    Google Scholar 

  43. Georgakakis E, Nikolidakis SA, Vergados DD, Douligeris C (2011) An analysis of Bluetooth, Zigbee and Bluetooth low energy and their use in WBANs. In: Lin JC, Nikita KS (eds) Wireless mobile communication and healthcare. MobiHealth 2010. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 55. Springer, Berlin, Heidelberg

    Google Scholar 

  44. Idris Y, Muhammad NA A comparative study of wireless communication protocols: Zigbee vs Bluetooth. IJESC 6(4). https://doi.org/10.4010/2016.867. ISSN: 2321 3361

  45. Baker N (2005) ZigBee and Bluetooth: strengths and weaknesses for industrial applications. IEE Comput Control Eng 16(2):20–25

    Article  Google Scholar 

  46. Mihajlov B, Bogdanoski M (2011) Overview and analysis of the performances of ZigBee based wireless sensor networks. Int J Comput Appl (0975–8887) 29(12)

    Google Scholar 

  47. ZigBee Alliance (2009) ZigBee technical document [Online]. Available: https://www.zigbee.org/Products/TechnicalDocumentsDownload

  48. Lee J, Su Y, Shen C (2007) A comparative study of wireless protocols: Bluetooth, UWB, ZigBee, and Wi-Fi. In: The 33rd annual conference of the IEEE industrial electronics society (IECON). Taipei, Taiwan, 5–8 November 2007

    Google Scholar 

  49. Didla S, Ault A, Bagchi S (2008) Optimizing AES for embedded devices and wireless sensor networks. In: TridentCom ‘08: proceedings of the 4th international conference on testbeds and research infrastructures for the development of networks and communities. Article No.: 4, pp 1–10

    Google Scholar 

  50. Kwon Y, Kim H (2012) Efficient group key management of ZigBee network for home automation. In: 2012 IEEE international conference on consumer electronics (ICCE). IEEE, pp 378–379

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Malvika Gupta .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Gupta, M., Singh, S. (2021). A Survey on the ZigBee Protocol, It’s Security in Internet of Things (IoT) and Comparison of ZigBee with Bluetooth and Wi-Fi. In: Gao, XZ., Kumar, R., Srivastava, S., Soni, B.P. (eds) Applications of Artificial Intelligence in Engineering. Algorithms for Intelligent Systems. Springer, Singapore. https://doi.org/10.1007/978-981-33-4604-8_38

Download citation

Publish with us

Policies and ethics