Font Size: a A A

Research And Implementation Of Access Mechanism For Special Zigbee System

Posted on:2016-11-03Degree:MasterType:Thesis
Country:ChinaCandidate:X X MaFull Text:PDF
GTID:2298330467993067Subject:Electronics and Communications Engineering
Abstract/Summary:PDF Full Text Request
As ZigBee applications are more widely applied in recent years, the security requirements of special ZigBee system are also increasing, especially in some industries and areas of petroleum, petrochemicals, public security, energy monitoring, etc. This paper focuses on the IEEE802.15.4standard and security service specification of the ZigBee Alliance. All kind of threat that may occur are analyzed from the perspective of network access, and then this paper carries out the enhanced program design and implementation of Zigbee security respectively from the process of network identification, network access and network authentication to meet the needs of the special ZigBee system.Firstly, ZigBee system is mainly achieved through monitoring beacon frame from the perspective of network discovery. Therefore, this research studies the procedure and mechanism of network discovery, focuses on the factors that influence beacon frame detection and identification, conducts scheme design and improvement from aspects of beacon frame reception and identification, and by means of modifying the value of scan type identifier, modifying the value of protocol identifier in network layer of network frame and other means to influence and stop the discovery process of unauthorized network device.Secondly, from the perspective of network access, ZigBee system are connected mainly through three ways as the MAC layer association join, REJOIN command in the network layer, and direct access i.e. the orphan scan join. In consider of the factors affecting the access process and access procedure, this paper proposes two schemes:one is to modify the related parameters that affect access procedure; the other is to join ZigBee net by means of pre-configuring by the long/short address, etc. reservation information matching.Finally, from the perspective of network authentication, ZigBee system is mainly to achieve standard security mode and high security mode access in three circumstances as in pre-configured, network key, pre-configured master key in the trust center. Considering all the circumstances, this paper designs four options from the perspective of influencing the key type identification and the certification process.In summary, three modules of network discovery, access and authentication are fully studied and discussed in this paper. And to verify the reliability of the entire program, field testing are carried out at the module level and system level. Different measures mentioned in this article can be applied based on the actual needs for different special ZigBee system. Of course, security problems still exist in the future, and how to protect special ZigBee system access process in a better way still has a long way to go, the author will pay sustained attention on this field.
Keywords/Search Tags:Special ZigBee system, Network discovery, Networkaccess Network authentication
PDF Full Text Request
Related items