Security Protocols and Privacy Issues Into 6Lowpan Stack: a Synthesis Christine Hennebert, Jessye Dos Santos

Total Page:16

File Type:pdf, Size:1020Kb

Security Protocols and Privacy Issues Into 6Lowpan Stack: a Synthesis Christine Hennebert, Jessye Dos Santos Security Protocols and Privacy Issues into 6LoWPAN Stack: A Synthesis Christine Hennebert, Jessye Dos Santos To cite this version: Christine Hennebert, Jessye Dos Santos. Security Protocols and Privacy Issues into 6LoW- PAN Stack: A Synthesis. IEEE internet of things journal, IEEE, 2014, 1 (5), pp.384-398. 10.1109/JIOT.2014.2359538. hal-03021091 HAL Id: hal-03021091 https://hal.archives-ouvertes.fr/hal-03021091 Submitted on 22 Jan 2021 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. This is the author's version of an article that has been published in this journal. Changes were made to this version by the publisher prior to publication. The final version of record is available at http://dx.doi.org/10.1109/JIOT.2014.2359538 1 Security Protocols and Privacy Issues into 6LoWPAN Stack: A Synthesis Christine Hennebert , Jessye Dos Santos CEA-LETI, Minatec Campus, 17 rue des martyrs, 38054 Grenoble, France [email protected]; [email protected] interact via these objects. In a pervasive environment the Abstract — With the emergence of the Internet of Things communicating objects are able to recognize and to locate by (IoT), many devices organized into network, communicate by themselves. The intelligence becomes ambient. The systems themselves on the Internet and send data, or private information become ubiquitous [2]. In this context, the challenges of on the web. It is essential to secure the transmitted data and the miniaturization and deployment in the environment are identities that may be disclosed to make these new technologies accepted by the largest number of citizens. However, the security significant. mechanisms widely used on the Internet are too heavy to be The convergence of the Internet with embedded systems led integrated on small constrained objects. This paper describes the to the emergence of new systems deployed on a large scale current protocols and security solutions that can be deployed in and coupled to their physical environment. It is the concept of constrained resources. It shows the benefits and the limitations of the Cyber Physical Systems (CPS) which includes RFID each scheme – the security extension of IEEE 802.15.4e in Time technology, wireless sensor networks (WSN), taking into Synchronization Channel Hopping (TSCH) mode , compressed IPsec, DTLS - embedded at different levels of the OSI model into account the mobility or the use of a smart phone to monitor the 6LoWPAN stack. It opens with the challenges one must tackle various data from sensors via the cellular network [3]. in the coming years. Several use cases are studied to envisage the The rise of the IoT and the CPS is enabled by the security integration in Cyber Physical Systems for host-to-host 6LoWPAN technology which means Internet as support and host-to-network communications. The privacy issue is also infrastructure for the sensor networks [4]. addressed and different ways to hide the device identity are The reference protocol for the Internet is IP (Internet discussed. Protocol). By extension, the CPSs are based on IP. But IP is Index Terms — 6LoWPAN, Security, Privacy, Protocol Stack, not suitable for the sensor networks composed of resource OSI layers, Internet of Things, Cyber Physical Systems, End-to- constrained devices. 6LoWPAN [5] provides an adaptation of End Security the IP world to the constraints of the sensor networks and enables the connection of the sensor networks world with the I. INTRODUCTION Internet. However, 6LoWPAN has been designed more to HE world has changed. Everything went very quickly ensure the interoperability of both worlds - the sensor Twith the advent of the Internet of Things (IoT) and the networks and the internet – so they meet the specific emergence in our daily life of heterogeneous objects able to constraints related to the lack of resource of the sensor connect to the Internet and communicate on the web. Since the networks [6]. In the OSI abstraction model, 6LoWPAN is an “Nabaztag” launched in 2005 thus being considered as the first adaptation layer located between the network layer and the communicating object, many other innovative objects have link layer (Fig. 1). been designed, and today objects as common as a crate of vegetables, a coffee machine or running shoes, exchange data Application Application on the Internet [1]. It is estimated that by the end of the decade, the number of communicating objects on the planet UDP Transport will reach 50 billion and will be 7 times greater than the IPv6 Network number of humans. 6LoWPAN Adaptation These autonomous objects are provided with memories, a communication channel, a processor and sensors or actuators MAC 802.15.4 Link conferring a form of intelligence. Thus, with the IoT, the PHY 802.15.4 Physical object becomes an actor of a process. It contributes at changing individual and collective behavior of people who Fig. 1: 6LoWPAN Protocol Stack 6LoWPAN achieves low overhead by applying cross-layer ________________________________________________________ Copyright © 2014 IEEE. Personal use of this material is permitted. However, optimization and compression of the headers of the IPv6 permission to use this material for any other purposes must be obtained from protocol stack. This allows making available about 81 bytes to the IEEE by sending a request to [email protected]. Copyright (c) 2014 IEEE. Personal use is permitted. For any other purposes, permission must be obtained from the IEEE by emailing [email protected]. This is the author's version of an article that has been published in this journal. Changes were made to this version by the publisher prior to publication. The final version of record is available at http://dx.doi.org/10.1109/JIOT.2014.2359538 2 transmit data on the Internet into an IEEE 802.15.4 frame. WSN motes. However, it remains a key issue: ensuring security of data A. Integration of an IPv6 packet into an IEEE 802.15.4 frame exchanged via 6LoWPAN [7]. When IPsec and then TLS (Transport Layer security) The length of an IEEE 802.15.4 frame at the physical layer is 127 bytes. Including at most the 25 bytes header of the become mature technologies in the world of the Internet, their 1 adaptation in the LoWPAN world is still a challenge (Fig. 2). Medium Access Control sub-layer, 102 bytes remain These protocols need significant resources and generate a available for the IP payload. The overhead of the IP headers substantial overhead. An attempt to compress IPsec, only in following by optional extensions and the UDP header takes transport mode, is presented by Raza in [8], while the about 48 additional bytes. It remains only 54 bytes for the emergence of Datagram TLS to secure the applications raises payload over UDP at application layer. It is obvious that an many questions about the implementation and the deployment adaptation must be introduced to support an IPv6 MTU in the real world. (Maximum Transmission Unit) of 1280 bytes. At this stage, no security mechanism is defined at any layer. HTTP, HTTPs, CoAP, CoAPs CoAP, CoAPs Link Layer Network Layer Transport Layer HTTP, CoAP u CoAP TCP, UDP TLS, DTLS UDP DTLS IEEE 802.15.4 MAC header IPv6 header UDP header Payload checksum TLS, DTLS u DTLS 23 bytes 40 bytes 8 bytes 54 bytes 2 bytes IPv4, IPv6 IPsec IPv4, IPv6 u 6LoWPAN IPv6 Compressed IPsec u … IPsec compressed IPsec 6LoWPAN IEEE 802.15.4 frame = 127 bytes Ethernet ⊳u IEEE 802.15.4 Ethernet IEEE 802.15.4 Fig. 3: Integration of an IPv6 packet into an IEEE 802.15.4 frame Internet Border Router WSN The 6LoWPAN adaptation layer is located between the link Fig. 2: Protocol Stack of a WSN connected to Internet layer and the network layer and should supply solutions for: - Fragmentation and reordering of IPv6 packets This article proposes a review of the security protocols into - Compression of the protocol stack headers the 6LoWPAN protocol stack, and it addresses the challenges - Enabling stateless addressing and the limitations for a pragmatic deployment in a physical - Providing a basis for “mesh-under” routing environment. The paper is intended for designers and - Assuring consistency with the upper layers developers of the Internet of Things to provide the technical and decision-making basis in order to integrate security into When routing packets is performed by the network layer, it the system upon its conception. is called “route-over”, and when the routing is implemented at The paper is organized as follow: Section II summarizes the the adaptation layer, it is called “mesh-under”. 6LoWPAN communication protocols standardized and The traditional compression technique of the IP header recommended by the IETF (Internet Engineering Task Force). consists in optimizing flow traffic while using stateful Section III details how the security protocols already adopted addresses. But flow-based compression techniques are poorly in the traditional Internet can be compressed and adapted to suited for LoWPAN, for which applications usually consist in 6LoWPAN. It highlights the compromise done, the resulting singular exchanges instead of long-lived flows. So, the basic overhead and the remaining issues. But, by using the security concept of 6LoWPAN is to use stateless addresses and shared- tools which threats do we deal with and how? Section IV context compression between the different layers of the provides answers to this question.
Recommended publications
  • Wireless Home Automation Networks: a Survey of Architectures and Technologies
    GOMEZ MONTENEGRO LAYOUT 5/18/10 11:46 AM Page 92 CONSUMER COMMUNICATIONS AND NETWORKING Wireless Home Automation Networks: A Survey of Architectures and Technologies Carles Gomez and Josep Paradells, Technical University of Catalonia ABSTRACT USE CASES AND MAIN FEATURES OF Wireless home automation networks com- WHANS prise wireless embedded sensors and actuators that enable monitoring and control applications WHANs enable a variety of use cases, as illus- for home user comfort and efficient home man- trated in Fig. 1. A non-exhaustive list of exam- agement. This article surveys the main current ples is provided below and emerging solutions that are suitable for Light control: A new light can be controlled WHANs, including ZigBee, Z-Wave, INSTEON, from any switch, which reduces the need for new Wavenis, and IP-based technology. wired connections. Lights can also be activated in response to a command from a remote con- INTRODUCTION trol. Furthermore, they can be turned on auto- matically when presence and luminance sensors In recent years, wireless sensor and actuator net- detect that people are in a poorly illuminated works have gained high momentum, receiving room. significant attention from academia, industry, Remote control: Infrared technology has been and standards development organizations. One used for wireless communication between a of the primary application domains of this tech- remote control and devices such as TVs, HiFi nology is home automation. Wireless home equipment, and heating, ventilating, and air con- automation networks (WHANs) enable monitor- ditioning (HVAC) systems. However, infrared ing and control applications for home user com- requires line-of-sight (LOS) and short-distance fort and efficient home management.
    [Show full text]
  • Introduction to 6Lowpan And
    NetworkingNetworking LayerLayer ProtocolsProtocols forfor InternetInternet ofof Things:Things: . 6LoWPAN6LoWPAN andand RPLRPL Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 [email protected] These slides and audio/video recordings of this class lecture are at: http://www.cse.wustl.edu/~jain/cse574-18/ Washington University in St. Louis http://www.cse.wustl.edu/~jain/cse574-18/ ©2018 Raj Jain 14-1 OverviewOverview 6LowPAN Adaptation Layer Address Formation Compression RPL RPL Concepts RPL Control Messages RPL Data Forwarding Note: This is part 3 of a series of class lectures on IoT. Washington University in St. Louis http://www.cse.wustl.edu/~jain/cse574-18/ ©2018 Raj Jain 14-2 RecentRecent ProtocolsProtocols forfor IoTIoT MQTT, SMQTT, CoRE, DDS, Security Management AMQP , XMPP, CoAP, IEC, IEEE 1888, … IEEE 1888.3, IEEE 1905, TCG, IEEE 1451, Encapsulation: 6LowPAN, Oath 2.0, IEEE 1377, 6TiSCH, 6Lo, Thread… SMACK, IEEE P1828, Routing: RPL, CORPL, CARP SASL, IEEE P1856 EDSA, WiFi, Bluetooth Low Energy, Z-Wave, ZigBee Smart, ace, DECT/ULE, 3G/LTE, NFC, DTLS, Weightless, HomePlug GP, Dice, … 802.11ah, 802.15.4e, G.9959, WirelessHART, DASH7, ANT+, LTE-A, LoRaWAN, ISA100.11a, DigiMesh, WiMAX, … Ref: Tara Salman, Raj Jain, "A Survey of Protocols and Standards for Internet of Things," Advanced Computing and Communications, Vol. 1, No. 1, March 2017, http://www.cse.wustl.edu/~jain/papers/iot_accs.htm Washington University in St. Louis http://www.cse.wustl.edu/~jain/cse574-18/ ©2018 Raj Jain 14-3 IEEEIEEE 802.15.4802.15.4 Wireless Personal Area Network (WPAN) Allows mesh networking. Full function nodes can forward packets to other nodes.
    [Show full text]
  • 6Lowpan Platform Introduction
    6LoWPAN Platform Introduction Zengxu Yang May 3, 2018 6LoWPAN Platform Introduction May 3, 2018 1 / 16 Internet of Things I The Internet, which is based on the TCP/IP protocol stack and connects computers and mobile devices worldwide, has been very successful and deeply changed our lives. I Internet of Things, abbreviated as IoT, connects billions of objects that currently are not connected, like your microwave, cars, refrigirators, medical devices. I Ubiquitos computing and connected things makes everything smarter. Productivity can be improved, wastes and certain disasters can be avoided or reduced. Social life will be changed, just like the current Internet. I Internet of Things is based on the current Internet technology but it needs adaptation to solve some unique challenges. 6LoWPAN Platform Introduction May 3, 2018 2 / 16 Layers of IoT Just like the Internet can be divided into different layers, roughly, IoT networks can be divided into three layers: Application layer (some further divide it into application layer and middleware layer) It is responsible for deliverying application specific services to users. Network layer It connects to other smart devices and servers, transferring and communicating between them. Perception layer It is the physical layer that gathering sensor information about the environment. 6LoWPAN Platform Introduction May 3, 2018 3 / 16 IPv6 I The most successful and widely used IP protocol is called IPv4 with a 32 bit address space. IPv4 has its limitations. One of the biggest limitations is short of available addresses. I IPv6 is the next generation IP protocol with a 128 bit address space. It is large enough for the foreseeable future and especially important for the billions of devices on the IoT.
    [Show full text]
  • 6Lowpan: the Wireless Embedded Internet by Zach Shelby, Carsten Bormann Length: 254 Pages Publisher: John Wiley & Sons
    The Book 6LoWPAN: The Wireless Embedded Internet by Zach Shelby, Carsten Bormann Length: 254 pages Publisher: John Wiley & Sons The world’s first book on IPv6 over low power wireless networks and the new 6LoWPAN standards. http://6lowpan.net Companion web‐site with blog, full companion course slides and exercises v6.12.2009 6LoWPAN: The Wireless Embedded Internet, Shelby & Bormann 1 Outline • Introduction – The Internet of Things – Applications of 6LoWPAN • The Internet Architecture and Protocols • Introduction to 6LoWPAN • Link‐Layer Technologies – IEEE 802.15.4 • The 6LoWPAN Format • Bootstrapping – Link‐Layer Commissioning – Neighbour Discovery v6.12.2009 6LoWPAN: The Wireless Embedded Internet, Shelby & Bormann 2 Outline • Security • Mobility & Routing – IP Mobility Solutions – Ad‐hoc Routing Protocols – The IETF RPL Protocol • Application Formats and Protocols • System Examples – ISA100 Industrial Automation – Wireless RFID Infrastructure – Building Energy Savings v6.12.2009 6LoWPAN: The Wireless Embedded Internet, Shelby & Bormann 3 Introduction v6.12.2009 6LoWPAN: The Wireless Embedded Internet, Shelby & Bormann 4 v6.12.2009 6LoWPAN: The Wireless Embedded Internet, Shelby & Bormann 5 Benefits of 6LoWPAN Technology • Low‐power RF + IPv6 = The Wireless Embedded Internet • 6LoWPAN makes this possible • The benefits of 6LoWPAN include: – Open, long‐lived, reliable standards – Easy learning‐curve – Transparent Internet integration – Network maintainability – Global scalability – End‐to‐end data flows v6.12.2009 6LoWPAN: The Wireless
    [Show full text]
  • A Survey of Iot Protocols and Their Security Issues Through the Lens of A
    A survey of IoT protocols and their security issues through the lens of a generic IoT stack Jonathan Tournier, François Lesueur, Frédéric Le Mouël, Laurent Guyon, Hicham Ben-Hassine To cite this version: Jonathan Tournier, François Lesueur, Frédéric Le Mouël, Laurent Guyon, Hicham Ben-Hassine. A survey of IoT protocols and their security issues through the lens of a generic IoT stack. Internet of Things, Elsevier, 2020, pp.100264. 10.1016/j.iot.2020.100264. hal-02918332 HAL Id: hal-02918332 https://hal.inria.fr/hal-02918332 Submitted on 20 Aug 2020 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. A survey of IoT protocols and their security issues through the lens of a generic IoT stack Jonathan Tourniera,b, François Lesueurb, Frédéric Le Mouëlb, Laurent Guyona, Hicham Ben-Hassinea aAlgosSecure, 57 bd Vivier Merle, Lyon, France bUniversité de Lyon, INSA-Lyon, CITI, F-69621, Villeurbanne, France Abstract The Internet of things (IoT) is rapidly growing, and many security issues relate to its wireless technology. These security issues are challenging because IoT protocols are heterogeneous, suit different needs, and are used in different application domains.
    [Show full text]
  • Z-Wave to IP Software
    Z-Wave to IP Software/ Firmware Bridges the Worlds of Z-Wave and IoT By Raoul Wijgergangs, Vice President Z-Wave Business IoT via Z-Wave: Bridging IP& Z-Wave for Low Power Mesh Network IoT Abstract/Executive Summary: The Z/IP Gateway bridges the low-power and ultra-reliable Z-Wave wireless communications protocol with the Internet of Things (IoT) by assigning a unique IP address to each device within a Z-Wave network. This provides the best of both worlds: a super reliable, low-power smart home network combined with standard Internet protocol on the LAN network. Z-Wave is already widely deployed in home security and home automation systems as the protocol of choice for low-power wireless communications. Now, with the Z/IP Gateway, every device in a Z-Wave network can be directly accessible over the Internet using IP communications. The Z/IP Gateway is a soft- ware/firmware technology that is incorporated into new Z-Wave controllers, effectively transforming these home automation hubs into gateways for IP communication with Z-Wave devices. With the Z/IP Gateway technology, product designers can add IoT connectivity to practically any device in the home with minimal power consumption and minimal added cost. ----------------------- IoT – the Internet of Things – is a hot tech trend, envisioning a future where practically everything will be connected, but exactly how they will be connected remains fuzzy. While consumers may simply assume everything will have Wi-Fi, engineers know better. Wi-Fi has inherent problems with power consumption and topology that make it impractical for many battery-powered devices.
    [Show full text]
  • Comparisons of 6Lowpan Implementations on Wireless Sensor Networks
    2009 Third International Conference on Sensor Technologies and Applications Comparisons of 6LoWPAN Implementations on Wireless Sensor Networks Yannis Mazzer, Bernard Tourancheau LIP UMR 5668 of CNRS-ENS-INRIA-Universite´ Lyon1 Lyon, France [email protected] Abstract approach choices for the design of a modular 6LoWPAN stack for sensor network. This paper introduces our work on the communication stack of wireless sensor networks. We present the IPv6 ap- 2. Presentation of 6LoWPAN proach for wireless sensor networks called 6LoWPAN in its IETF charter. We then compare the different implementations 6LoWPAN [1][2] enables all the capabilities of IPv6 of 6LoWPAN subsets for several sensor nodes platforms. on WSN. This standard access to the IP world opens the We present our approach for the 6LoWPAN implementation usage of WSN in the field of, for instance, distributed which aims to preserve the advantages of modularity while computation with the classical Message Passing Interfaces keeping a small memory footprint and a good efficiency. [3], the implementation of sensing device on-line control [4] and tools for the user interfaces [5]. Index Terms The adaption of IPv6 to constrained devices starts by compressing the long IPv6 headers to 6 bytes, taking into Wireless Sensor Network, Communication Stack for Sen- account the link-local informations. The routing is adapted sor, 6LoWPAN, IPv6. to the hop-by-hop ”meshed” point of view of the WSN. The routing main capabilities are placed at the border routers for each node to have limited routing tables. 1. Introduction Sensor network is a growing technology which aims to 3.
    [Show full text]
  • A Review of 6Lowpan Routing Protocols
    Proceedings of the Asia-Pacific Advanced Network 2010 v. 30, p. 71-81. http://dx.doi.org/10.7125/APAN.30.11 ISSN 2227-3026 A Review of 6LoWPAN Routing Protocols Gee Keng Ee*, Chee Kyun Ng, Nor Kamariah Noordin and Borhanuddin Mohd. Ali Department of Computer and Communication Systems, Faculty of Engineering, Universiti Putra Malaysia, UPM Serdang, 43400 Selangor, Malaysia. E-Mails: [email protected], {mpnck, nknordin, borhan}@ eng.upm.edu.my Tel.: +603-89466445; Fax: +603-86567127 Abstract: Internet Engineering Task Force (IETF) working group has standardized the transmission of internet protocol version 6 (IPv6) packets over IEEE 802.15.4 low power wireless personal area network (LoWPAN) as 6LoWPAN protocol. It provides the wireless sensor network (WSN) node with IP communication capabilities by putting an adaptation layer above the 802.15.4 link layer. Different mechanisms performed by adaptation layer require the 6LoWPAN header encapsulation in the packet. Although routing is among the key issues of 6LoWPAN research, the way to encapsulate a new routing header in the 6LoWPAN packet has yet been investigated thoroughly. In this paper, different ways of routing header encapsulation in 6LoWPAN protocol stack is discussed. The simplified version Ad-Hoc On-Demand Distance Vector (AODV) such as On-Demand Distance Vector (LOAD) and Dynamic MANET On-demand for 6LoWPAN (DYMO-low) have currently been proposed in 6LoWPAN routing. Hierarchical routing (HiLow) is another routing protocol that is used in 6LoWPAN to increase the network scalability. Some comparisons of these routing protocols have been made in terms of their routing metric such as number of hops count.
    [Show full text]
  • Networking Layer Protocols for Internet of Things: 6Lowpan And
    NetworkingNetworking LayerLayer ProtocolsProtocols forfor InternetInternet ofof Things:Things: . 6LoWPAN6LoWPAN andand RPLRPL Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 [email protected] These slides and audio/video recordings of this class lecture are at: http://www.cse.wustl.edu/~jain/cse570-15/ Washington University in St. Louis http://www.cse.wustl.edu/~jain/cse570-15/ ©2015 Raj Jain 13-1 OverviewOverview 6LowPAN Adaptation Layer Address Formation Compression RPL RPL Concepts RPL Control Messages RPL Data Forwarding Note: This is part 3 of a series of class lectures on IoT. Washington University in St. Louis http://www.cse.wustl.edu/~jain/cse570-15/ ©2015 Raj Jain 13-2 IoTIoT EcosystemEcosystem Applications Smart Health, Smart Home, Smart Grid Security Management Smart Transport, Smart Workspaces, … TCG, Session MQTT, CoRE, DDS, AMQP , … IEEE 1905, Oath 2.0, IEEE 1451, Routing 6LowPAN, RPL, 6Lo, 6tsch, Thread, SMACK, … 6-to-nonIP , … SASL, ISASecure, Datalink WiFi, Bluetooth Smart, Zigbee Smart, ace, Z-Wave, DECT/ULE, 3G/LTE, NFC, CoAP, Weightless, HomePlug GP, 802.11ah, DTLS, 802.15.4, G.9959, WirelessHART, Dice DASH7, ANT+ , LoRaWAN, … Software Mbed, Homekit, AllSeen, IoTvity, ThingWorks, EVRYTHNG , … Operating Systems Linux, Android, Contiki-OS, TinyOS, … Hardware ARM, Arduino, Raspberry Pi, ARC-EM4, Mote, Smart Dust, Tmote Sky, … Washington University in St. Louis http://www.cse.wustl.edu/~jain/cse570-15/ ©2015 Raj Jain 13-3 IEEEIEEE 802.15.4802.15.4 Wireless Personal Area Network (WPAN) Allows mesh networking. Full function nodes can forward packets to other nodes. A PAN coordinator (like WiFi Access Point) allows nodes to join the network.
    [Show full text]
  • How Low Energy Is Bluetooth Low Energy? Comparative Measurements with Zigbee/802.15.4
    WCNC 2012 Workshop on Internet of Things Enabling Technologies, Embracing Machine-to-Machine Communications and Beyond How Low Energy is Bluetooth Low Energy? Comparative Measurements with ZigBee/802.15.4 Matti Siekkinen, Markus Hiienkari, Jukka K. Nurminen Johanna Nieminen Dept. of Computer Science and Engineering Nokia Research Center, Finland Aalto University, School of Science, Finland [email protected] fmatti.siekkinen,markus.hiienkari,jukka.k.nurmineng@aalto.fi Abstract—Ultra low power communication mechanisms are Classic Bluetooth and ZigBee has been extensively studied essential for future Internet of Things deployments. Bluetooth in the literature. See, e.g., [6]–[10] for some example studies. Low Energy (BLE) is one promising candidate for such de- To the best of our knowledge, this is the first work to measure ployments. We study the energy consumption of BLE by mea- suring real devices with a power monitor and derive models and model BLE energy consumption and to contrast the results of the basic energy consumption behavior observed from the with a “competing” technology. Our contributions are the measurement results. We investigate also the overhead of IPv6- following: based communication over BLE, which is relevant for future • We perform comparative energy measurements with real IoT scenarios. We contrast our results by performing similar measurements with ZigBee/802.15.4 devices. Our results show BLE and ZigBee devices and characterize energy con- that when compared to ZigBee, BLE is indeed very energy sumed in typical setup. efficient in terms of number of bytes transferred per Joule • Based on the measurements, we build simple models of spent.
    [Show full text]
  • Wireless Home Automation Networks: a Survey of Architectures and Technologies
    Wireless Home Automation Networks: A Survey of Architectures and Technologies Carles Gomez and Josep Paradells Presented by Deepen Solanki and Aishwarya Rao Table of Contents 1. Introduction to WHANs 2. Solutions for WHANs a. ZIGBEE b. Z - WAVE c. WAVENIS d. INSTEON e. IP BASED 3. Discussion 4. Conclusion INTRODUCTION - WHANs WHAN Connectivity Monitoring Control Sensors Actuators ● Remote Control of Devices - Appliances ● Remote Care - wearables, fall detection ● Smart Energy Monitoring - HVAC, usage patterns ● Security Systems - burglar alarm, smoke detection INTRODUCTION - WHANs Characteristics ● High node density - (100s) ● Multipath environment - multiple reflective surfaces ● Interference - Bluetooth devices, microwave ovens ● Multihop communications - combating range ● Self-healing network - mobile devices ● Various traffic patterns - P2P, P2MP, MP2P ● Quick results - emergency situations ● Internet connectivity - Remote monitoring ● Highly constrained nodes - memory, processing power SOLUTIONS FOR WHANs ● ZigBee ● Z-Wave ● INSTEON ● Wavenis ● IP Based Solutions ZIGBEE (2004) ● Low Data Rate - 20, 40, 250kbps ● Short Range - 10 to 100m ● Bands - 868MHz / 915MHZ / 2.4GHz ● DSSS ● Device types Coordinator End device Router Beacon ● Channel access ● Profiles Beaconless ● Tree, Mesh ZigBee Home Automation Public Application Profile ZigBee Smart Energy Profile Z-WAVE (1999) ● Reliable transmission of short messages from a control unit to one or more nodes in the network ● 868.42 MHz in Europe, 908.42 MHz in US, 2.4GHz* ● Low data rate
    [Show full text]
  • A Standardized and Flexible Ipv6 Architecture for Field Area Networks
    White Paper A Standardized and Flexible IPv6 Architecture for Field Area Networks: Smart-Grid Last-Mile Infrastructure Last update: January 2014 This paper is intended to provide a synthetic and holistic view of open-standards-based Internet Protocol Version 6 (IPv6) architecture for smart-grid last-mile infrastructures in support of a number of advanced smart-grid applications (meter readout, demand-response, telemetry, and grid monitoring and automation) and its benefit as a true multiservice platform. In this paper, we show how the various building blocks of IPv6 networking infrastructure can provide an efficient, flexible, highly secure, and multiservice network based on open standards. This paper does not address transition paths for electric utilities that deal with such issues as legacy devices, network and application integration, and the operation of hybrid network structures during transitional rollouts. Figure 1. The Telecom Network Architecture Viewed as a Hierarchy of Interrelated Networks Page 1 of 23 1. Introduction Last-mile networks have gained considerable momentum over the past few years because of their prominent role in the smart-grid infrastructure. These networks, referred to as neighborhood-area networks (NANs) in this document, support a variety of applications including not only electricity usage measurement and management, but also advanced applications such as demand/response (DR), which gives users the opportunity to optimize their energy usage based on real-time electricity pricing information; distribution automation (DA), which allows distribution monitoring and control; and automatic fault detection, isolation and management. NANs also serve as a foundation for future virtual power plants, which comprise distributed power generation, residential energy storage (for example, in combination with electric vehicle (EV) charging), and small-scale trading communities.
    [Show full text]