Research of ZigBee’s data security and protection
- 格式:pdf
- 大小:308.86 KB
- 文档页数:5
ZigBee环境监测技术中英文资料对照外文翻译文献综述简介本文综述了有关ZigBee环境监测技术的中英文资料,并提供了对照的外文翻译文献。
ZigBee是一种低功耗的无线通信技术,特别适用于物联网应用中的环境监测。
通过对这些资料的对比和研究,可以更好地了解和应用ZigBee环境监测技术。
中文资料1. 许明宝, 胡永凡, 钟红民. 基于ZigBee的环境监测系统研究[J]. 现代检测技术, 2011, 31(1): 5-8.2. 杨洛, 李明洲. 基于ZigBee的温湿度监测系统设计[J]. 现代电子技术, 2012(9): 29-32.3. 谭勇, 王群, 李吉庆. 基于ZigBee的室内环境监测系统设计[J]. 仪器仪表学报, 2015, 36(3): 571-575.英文资料1. Wang, X., Hu, Z., & Hang, L. Wireless sensor network-based indoor temperature and humidity monitoring system using ZigBee technology[C]. 2020 6th International Conference on Control, Automation and Robotics (ICCAR), 2020: 100-105.2. Gao, J., Li, R., & Zhang, L. Study on wireless temperature and humidity monitoring system based on ZigBee[C]. 2019 4th International Conference on Green Technology and Sustainable Development (GTSD), 2019: 1-5.外文翻译文献1. 许明宝, 胡永凡, 钟红民. 基于ZigBee的环境监测系统研究(英文翻译). 现代检测技术, 2011, 31(1): 5-8. (Translation of "Research on ZigBee-based Environmental Monitoring System" by Xu Mingbao, Hu Yongfan, and Zhong Hongmin)2. 杨洛, 李明洲. 基于ZigBee的温湿度监测系统设计(英文翻译). 现代电子技术, 2012(9): 29-32. (Translation of "Design of ZigBee-based Temperature and Humidity Monitoring System" by Yang Luo and Li Mingzhou)3. 谭勇, 王群, 李吉庆. 基于ZigBee的室内环境监测系统设计(英文翻译). 仪器仪表学报, 2015, 36(3): 571-575. (Translation of "Design of ZigBee-based Indoor Environment Monitoring System" by Tan Yong, Wang Qun, and Li Jiqing)以上是有关ZigBee环境监测技术的中英文资料对照外文翻译文献综述。
ZigBee-RFID混合网络的节电与寿命的最大化P. Medagliani , G. Ferrari M. Marastoni意大利帕尔玛大学信息工程学系,无线Ad-hoc传感器网络(WASN)实验室Pride s.p.a., I-20151 米兰, 意大利摘要ZigBee是一种的无线个人区域网络标准,应用在需求低功耗的情况,比如无线传感器与控制网络。
由于节点可能被布置在一个交通不便的地方,因此需要高能量效率,最大限度地提高网络的寿命和减少维护费用。
为了提高寿命,一个简单而直接的解决办法是关闭所有不必要的节点,例如,当节点空间密度大于检测需要时,就可以关闭那些不必要的节点。
我们设想一个新型ZigBee无线交互网络,远程传感器节点可以选择性地关闭。
更确切地说,无线控制是基于射频识别(RFID)技术,从而实现一个ZigBee/RFID 混合结构。
换言之,我们考虑使用两个逻辑重叠的网络,RFID和ZIGBEE网络。
RFID网络,通过一个电源关闭算法打开或关闭节点的ZigBee网络。
这个算法被称为深度睡眠算法,旨在平衡各个ZigBee节点的剩余能量。
事实上,RFID控制器(即阅读器)循环开关剩余能量很低的ZigBee节点。
通过构建所提出的RFID控制ZIGBEE技术,我们专注于观测点的需要最少的空间密度实现。
这是出于实际利益考虑,比如在一个分布式监控应用中,其中一个节点需要使用同一种方式监控尽可能大的区域。
在这种情况下,我们在监控区域引进了一种虚拟空间网格,并且在网络中的每个节点应用深度睡眠算法,要求在同一时间最多只有一个节点是工作的。
我们利用基于Opnet网络模拟对所提出的ZigBee-RFID混合网络进行分析。
1.简介无线传感器网络是一个有趣的研究课题,不仅在军事领域,也同时在民用领域。
特别是在远程/环境监测、保护区的监视等,都是无线传感网络技术的重要应用领域。
这些应用通常需要低耗能和低成本。
ZigBee联盟提出了一项最新的无线网络标准,其具有低传输速率和高能量效率。
A Coal Mine Environmental Monitor System with LocalizationFunction Based on ZigBee-Compliant PlatformDongxuan YangCollege of Computer and InformationEngineeringBeijing Technology and BusinessUniversityBeijing, ChinaYan ChenCollege of Computer and InformationEngineeringBeijing Technology and BusinessUniversityBeijing, China*****************Kedong WangCollege of Computer and InformationEngineeringBeijing Technology and BusinessUniversityBeijing, ChinaAbstract—This paper describes and implements a new type of coal mine safety monitoring system, it is a kind of wireless sensor network system based on ZigBee technology. The system consists of two parts underground and surface. Wireless sensor networks are constituted by fixed nodes, mobile nodes and a gateway in underground. PC monitoring software is deployed in the surface. The system can not only gather real-time environmental data for mine, but also calculate the real-time location of mobile nodes worn by miners.Keywords:ZigBee; localization; wireless sensor networks; coal MineI.RESEARCH STATUSAs an important energy, coal plays a pivotal role in the economic development. Coal mine monitoring system, is the important guarantee for coal mine safety and high efficiency production [1]. In order to ensure the safe operation, the installation of environment monitoring node in tunnels to real-time detection is very important. However, commonly used traditional monitoring node wired connection to obtain communication with the control system, this node exist wiring difficulties, expensive and other shortcomings. In contrast, wireless sensor node can be easily with current mine monitoring network connection, and good compatibility, facilitate constituted mine gas monitoring network, to suit various size of mine applications. Since wireless nodes are battery powered, so completely out of the shackles of the cable, shorten the construction period can be arranged at any time where the need to use.The ZigBee wireless communication technology is used in this coal mine environmental monitor system. This is a new short-range, low complexity, low power,low data rate, low-cost two-way wireless communication technology [2]. Now, wireless sensor network product based on ZigBee technology are quantity and variety, but the real product can be applied in underground environments of special sensor node is very few[3]. The sensor node that we designed in the system is truly able to apply to in-well environment, it through the wireless sensor node security certification. At the same time, due to the special nature of the wireless network is that it can spread the wireless signal, we can easily locate staff for coal mine safety monitoring provides more protection [4].II. SYSTEM ARCHITECTUREThis system is a comprehensive monitoring system which is combined with software and hardware. Hardware part includes wireless mobile nodes and fixed nodes which were deployed in the underground tunnel, the main function of them is to collect coal mine environment data and require person’s location. Software part refers to the PC monitoring software which is designed in VC++ is used to summarize and display the data of each node. Monitoring node is divided into mobile nodes and fixed nodes; they are using ZigBee protocol for wireless transmission of data. Because the fixed node is also using wireless data transmission method, so it's deployed in the underground roadway becomes very convenient. As the mobile node is carried by the miner, it must be using wireless transmission method. This allows the mine to form a topology of ZigBee wireless sensor network. The fixed node in wireless sensor network is router device and the mobile node carried by miner is the end device. Normally, the router of ZigBee network has no sensor equipment; it is only responsible for data forwarding. But considering the practical application, we believe that add sensor devices on the router will be better on monitoring underground coal mine environment. So in our design, the router also has an environment monitoring function which is usually designed in end device.Fixed node will sent received data from mobile node to the gateway, then the gateway transmits data to monitor computer through RS232 or optical fiber. The PC monitor software in the computer will process all data and display them in a visualization window. The PC software also calculates each mobile node’s real-time location through the specific localization algorithm, according to the received signal strength (RSSI) obtained from mobile nodes.III. NODE DESIGNSince the ZigBee wireless network platform sold on present market was designed for the general environment, for special underground so they are not suitable for the environment. Therefore, we need to customize the system for underground environment whit a special hardware circuit. Node photo are shown in Fig. 1 Then wireless microcontroller CC2530 chip is the core processor of the node device, it can constitute a ZigBee network with very few peripheral circuits. TheCC2530 is an IEEE 802.15.4 compliant true System-on-Chip, supporting theproprietary 802.15.4 market as well as the ZigBee, ZigBee PRO, and ZigBee RF4CE standards. Unlike other wireless chip, CC2530 built-in 8051 monolithic integrated circuits kernel, therefore we no longer need to use a single MCU to control the circuit, and this save us a lot of cost [5].A.Mobile NodeThe mobile node is the end device of a ZigBee network that can be carried by miner; it should be a portable and low power consumption node. So the mobile node we designed is only as small as a mobile phone, and it is by built-in lithium ion battery power supply. In power loss, the core processor CC2530 is a low power consumption chip, when it is in the sleep mode, it only need to use less then 1uA work current. In order to reduce power consumption as much as possible on the display, a 100*32 pixel matrix with no backlighting LCD screen was used. The battery’s capacity of the mobile node is 1500mAh,so it is enough to meet the miner’s long hour works in the underground. The battery charge management chip is TP4057, the maximum charge current can up to 500Ma.Figure 1. Node photo.The mobile node circuit includes the gas concentration sensor MJ4.0 and temperature sensor PT-1000. As far as we know, many wireless sensor platforms use the digital type sensor. The communication between the digital sensor and the MCU need strict timing requirements. But considering the actual application, the wireless MCU usually has a real-time operating system in general, if we use the microcomputer to simulate the strict timing, it will affect the real-time of whole operating system. These two sensors output analog signals not digital signals. Only input this signal into a differential amplifier, can we get an appropriate signal that can be converted to a digital signal by an ADC mode within the CC2530 chip. In order to facilitate the carrying, external antenna was not used in our mobile node, instead ofusing a 2.4GHz patch antenna. And we customize a shell like a cell phone size; it is enough to put all PCBs, sensors and battery in it. Taking into account the small shell of the explosive performance is not very good, the design of PCBs and the selection of component are all carried out the safety assessment.B. Fixed NodeFixed node is installed in the wall of the underground tunnel. Because it is big than the mobile node, it is not appropriate to carry around. The circuit of the fixed node is almost same with the mobile node, it also use a CC2530 chip as core processor. Because of underground tunnels generally deploy with power cable, fixed nodes can use cable power-supply modes. At the same time, because we use wireless signal transmission, the deployment of new fixed nodes become very convenient, which also resolves the problem of the signal lines deployment.As a fixed node, the minor who is doing work may far from it, in order to facilitate the miners observed environmental data around the fixed nodes, it uses LED digital display. At the same time, the large current LED lights and buzzer are designed in the circuit; it makes the fixed node with the function of sound-light alarm. Considering that it may occur the emergency of without electricity, fixed node also built-in a lithium-ion battery. Under normal conditions, lithium-ion battery is in charging status, when external cable disconnect, fixed node is automatic switched to battery power, which can ensure the mobile node can deliver the information through fixed nodes in underground.Without regarding to fixed nodes’ portability, we have a customized shell that has excellent explosion properties, and the internal space is enough to hold down the 2.4 GHz antenna. To ensure safety, all cables and the location of sensors are placed with particular glue sealed, so that it has a good seal.IV.POSITIONING FUNCTIONOne of the important functions of the wireless sensor networks is localization, especially in the underground tunnel, it relates to the safe of the miner's life. Currently most widely used orientation method is GPS satellite positioning, it is a high precision, all-weather and global multifunctional system with the function of radio navigation, positioning and timing. But the GPS positioning method is not suitable for the underground work environment of coal mine, once you enter the underground, it cannot receive satellite signal, thus unable to achieve targeting [6]. We need to consider how to use wireless network to realize positioning function, means using wireless signal between the communications of devices for positioning. The existing distance measuring technology between the wireless-devices basically is the following kinds of methods: TOA, TDOA, AOA and RSSI.About the TOA method, the distance between the two devices is determined by the product of the speed of light and transmission time [7]. Although the precision of this method is accurate, but it require a precise time synchronization, so it demand hardware is higher.TDOA technology need ultrasonic signal,which is setting on a node with receive and transmit function. When measure the distance, it can sent ultrasonic wave and wireless signals together. By measuring the difference between two signals arrival time, we can calculate the distance between two devices [8]. Using this method can also obtain accurate result, but the method need to increase ultrasonic sending and receiving device on the node circuit, it will increase cost.AOA technology needs to install multiple antennas through the nodes so it canobtain adjacent nodes’ signals on deferent directions [9]. With this it can determine the location information from number of adjacent nodes and calculate its own position. This method not only need to add additional hardware, but also it's still very vulnerable to external disturbance, therefore it's not suitable for utilize.RSSI ranging is a cheap and easy technology. By using this method, we don't need to add additional hardware design. We also do not need very precise time requirements. This technique is about with measuring the wireless signals strength in the propagation of the loss, to measure the distance between two nodes. Because of this method requires hardware equipment is less, algorithm is simple, so it has been using in many wireless communication field. Comprehensive all conditions, positioning on the use of RSSI ranging technique.A. Hardware Location EngineThe CC2431 wireless microcontroller chip produced by TI Company has a hardware location engine. From the software's point of view, CC2431’s hardware location engine has a very simple API interface, as long as writing the necessary parameters and waiting for calculation, it can read the location results [10].The hardware location engine is also based on RSSI technology. The localization system includes reference nodes and blind nodes. The reference node is a fixed node that located in a known position, the node know their place and send a packet notifyto other nodes. The blind node receives packets from reference nodes, which can obtains reference nodes’ location and the corresponding RSSI value and put them into the hardware location engine, and then the blind node’s location can be read from the engine [11].On the surface, using the CC2431 hardware location engine targeting the program as a good choice, but considering the practical application, it will encounter the following problems. First of all, we have choose the CC2530 as the main chip of fixed nodes of the system, its internal programs is running in ZigBee2007 protocol, but CC2431 as a early chip, it applies only to ZigBee2006 protocol. In the communications between CC2431 and CC2530 that will have compatibility problems. Secondly, CC2431 hardware location engine use the distributed computing, all mobile nodes’ location are calculated by themselves, and then they upload information to the gateway node, this will not only occupy the mobile node processing time, still it can take up more network resources. For this reason, we have to shelve this approach, consider how to implement location by using CC2530 chip.B. Software Location EngineIf we want to use CC2530 to implement location function, that we must write software location engine by ourselves. Because that chip do not have a hardware location engine inside of it. This software location engine is still used RSSI technology; meanwhile mobile node position is calculated by the PC software, so asto reduce the burden of mobile node computing. To calculate the mobile node location, there must be at least three reference nodes. We will regard router nodes as reference nodes in network, and record the X, Y coordinates of every reference node. Then we let the mobile node send signal to each reference node, so that each reference node can obtain a RSSI values, with these parameters, we can use trilateral measurement method to calculate the specified location of the mobile node. The simpler way give the mobile node to broadcast way to send data, then around it every router node would receive the data from the mobile node, thus obtains RSSI values. Once the mobile node number increasing network, this method will make router nodes more burden, because the every radio message that the router node receives will transmit from the low layer to the top layer. Finally the application layer will analyze data packets. Infact, the mobile node need not to broadcast transmitted data, other routing node can also receive the mobile node packets. Only child mobile nodes of the router node will continue to transmit the packet forwarding upward, the other router nodes will shield out the packet in the bottom of the protocol.In order to let all router nodes can receive the packet which sending by mobile nodes, and send its RSSI values up to the gateway node, we need to modify the relevant function in Z- Stack protocol which is provided by TI. First we find the function named afIncomingData, it deals with the received data from the bottom of protocol, in which we add some code that can obtain packet’s RSSI value. Then through the osal_set_event function to add and send an eventMY_RSSI_REPORT_EVT of RSSI value task to OSAL polling system. This event’s corresponding function will be executed in the task of OSAL interrupt-driven function, thus the mobile node corresponding RSSI values will be sent to gateway node. Through this method, the packet will only be processed by bottom function of the protocol. According to this method we can obtain corresponding RSSI value and save the computation time of mobile nodes.In fact, this software location engine is not implementing with a single mobile node, but through the operation of the whole system to achieve. By which the mobile node is only responsible for sending unicast packets. The mobile node’s parent router node is responsible to forward the packet to the gateway. Other router nodes are not responsible for forwarding this packet, just clipping the mobile node of RSSI value, then forwarded to the gateway. Finally the gateway bring all RSSI values of the mobile node to PC monitoring software, the corresponding mobile node’s location is calculated. In order to reduce the error, monitoring software will collect 10 times of the RSSI value and take average on it, and then select the nearest value of the three fixed nodes. Finally the trilateral measurement method is used to calculate the location of mobile nodes.V.SYSTEM IMPLEMENTATIONAll software systems embedded in nodes are based on Z-Stack. BecauseZ-Stack is an open-source project, it is very beneficial to the secondary development. These nodes were tested in a real coal mine locate in Shanxi Province. We deployed the fixed node every 50 meters in the tunnel, and also set a fixed node in each entrance of the work area. Because the fixed node have large size digital LED displays, so the display content of the fixed node can be seen far from away the miner. Each miner carries a mobile node, the temperature and gas concentration is displayed on the LCD screen at real-time.The gateway node is placed at the entrance of the mine, through the RS232 cable connected to the monitoring computer in the control room. In this system all packets collected by the gateway node are transmitted to PC through a serial port, and it can save historical data backup to a SQL database. The main function of monitoring software is to display and store the data of every node, and calculates related mobile nodes’ location according to RSSI values. The monitoring software has two main dialog interfaces, one is used to display a two- dimensional profile of the coal mine, and user can see all the miners' working position. Another interface is data displaying interface, and environmental data were shown here. The picture of PC monitoring software is shown in Fig. 2.Figure 2. PC monitoring software.VI.SYSTEM EV ALUATIONThrough repeated testing of the system, we made the system an objective assessment. First is the power consumption assess for node hardware, fixed node’s working voltage is in 9V ~ 24V when the power supplied by cable. The maximum operating current for fixed node is 93mA; the average operating current is 92.2mA. When the power cable was disconnected, fixed node powered by lithium-ion battery. On battery power, the fixed node’s maximum working current is 147mA; average working current is 146.3mA. Fixed nodes can work 8 hours on battery power at least.Another quite important performance is the location function of the system performance. At four different locations of tunnel and working areas, mobile nodes were placed there. Two sets of different average error data were shown in From table 1. Because this system uses RSSI technology and it relies mainly on the signal strength, the signal quality will be affected by interferences. From different locations’ errors we can see that, the error in working areas was larger than it in tunnels, because the tunnel is generally straight, but the shape of the working areas are uncertainty.We gratefully acknowledge Texas Instruments for devices provided to us free of charge. And also thank staffs of XinNuoJin Company for giving us supports onsystem testing.REFERENCES[1] Xinyue Zhong Wancheng Xie. “Wireless sensor network in the coal mineenvironment monitoring“. Coal technology, 2009, Vol. 28, No. 9,pp.102-103. [2] Shouwei Gao. “ZigBee Technology Practice Guide”. Beijing: Beijing Universityof Aeronautics and Astronautics Press , 2009, pp. 27-28.[3] Yang Wang, Liusheng Huang, Wei Yang. “A Novel Real-Time CoalMinerLocalization and Tracking System Based on Self-Organized Sensor Networks”.EURASIP Journal onWireless Communications and Networking, Volume 2010, Article ID 142092.[4] Sang-il Ko, Jong-suk Choi, Byoung-hoon Kim. “Indoor Mobile LocalizationSystem and Stabilization of Localizaion Performance using Pre-filtering”.International Journal of Control, Automation and Systems, Vol. 6, No. 2, pp.204-213, April 2008.[5] .[6] Hawkins Warren, Daku Brian L. F, Prugger Arnfinn F. “Positioning inunderg round mines”. IECON 2006 - 32nd Annual Conference on IEEE Industrial Electronics, 2006, pp. 3159-3163.[7] Zhu, Shouhong, Ding, Zhiguo, Markarian Karina. “TOA based jointsynchronization and localization”. 2010 IEEE International Conference on Communications, ICC 2010, 2010, Article ID 5502036.[8] Ni Hao, Ren Guangliang, Chang Yilin. “A TDOA location scheme in OFDMbased WMANs”. IEEE Transactions on Consumer Electronics,2008, Vol. 54, No. 3, pp. 1017-1021.[9] Dogançay Kutluyil, Hmam Hatem. “Optimal angular sensor separation for AOAlocalization”. Signal Processing, 2008, Vol. 88, No. 5, pp. 1248-1260.[10] K. Aamodt. “CC2431 Location Engine”. Texas Instruments, Application NoteAN042, SWRA095.[11] Tennina Stefano, Di Renzo Marco, Graziosi Fabio, Santucci Fortunato.“Locating zigbee nodes using the tis cc2431 location engine: A testbed platform and new solutions for positioning estimation of wsns in dynamic indoor environments”. Proc Annu Int Conf Mobile Comput Networking, 2008, pp.37-42.摘要-本文介绍并设计了一个新类型的煤矿安全监控系统,它是一种基于ZigBee 技术的无线传感器网络系统。
基于ZigBee技术的智能家居安全监控系统设计[摘要]ZigBee是一种新兴的短距离无线通信技术,为实现对家庭安全的实时监控,提出了智能家居远程安全监控系统设计方案。
系统基于ZigBee技术和GSMGPRS网络进行设计,能够通过彩信和短信发出监控图像和报警信息,接收远程指令;同时引入了多种传感器,实现了对家用电器的远程控制,实现了智能家居远程监控。
重点阐述了系统的硬件、软件设计以及系统的性能测试,实现了多个监控装置的无线联网。
实验结果表明,所设计的系统能够实现安全、便捷的智能家居远程监控,并具有较高的可用性和可靠性,验证了ZigBee技术应用于低速个域网具有低功耗、可扩展性以及较高的实用性等特点。
[关键词]:智能家居;无线网络;ZigBee;【Abstract】ZigBee is a new kind of short distance wireless communication technology,To realize the real-time monitoring of family security, and put forward the intelligent scheme. System based on ZigBee technology and GSMGPRS network design, can through the MMS and SMS send monitoring image and alarm information, receiving remote instruction; At the same time introduced a variety of sensors, realize the and system performance test, and realize multiple monitor wireless networking. The experimental results show that the designed system can realize the safe, convenient intelligent 、ELAN、HAI(美国海益)【l】以及已经打入中国市场的Honeywell(霍尼韦尔)、LG。
智能家居监测系统的设计Design of The Intelligent Home Furnishing Mornitorning System毕业设计成绩单毕业设计任务书毕业设计开题报告摘要随着嵌入式计算、传感器、无线通信等技术的飞速发展,无线传感网被广泛应用于环境监测、军事国防和工农业控制等诸多领域,已成为电子信息技术发展的一个热点。
CC2530是TI公司针对Zigbee的无线传感网芯片解决方案,具有功耗低,可靠性高,组网简单等优势。
基于CC2530和Zigbee协议,设计了温湿度数据采集系统。
在干扰环境下测试表明,网络具有较强的鲁棒性和自组能力。
本课题主要介绍基于CC2530为核心的家庭环境监测系统的硬件电路设计和软件流程设计,实现了在家庭环境中对温度、湿度、烟雾的监测。
将温度、湿度的信息量经过单片机处理后通过无线发送给上位机。
本设计使用Zigbee无线网络协议,将系统参数传输及控制,可与上位机实时通讯和监控。
关键词:CC2530 传感器Zigbee 环境监测ABSTRACTWith the rapid development of embedded computing, sensor, wireless communication technology, wireless sensor network is widely used in environmental monitoring, military defense, industrial and agricultural control fields, has become a hotspot in the development of electronic information technology. CC2530 is a wireless sensor network chip for Zigbee TI solution, with low power consumption, high reliability, simple networking advantages. CC2530 and based on Zigbee protocol, design the temperature and humidity data acquisition system, the software algorithm coordinator and ordinary nodes are given respectively, tested in interference environment, the network has strong robustness and self-organizing ability.This paper mainly introduces the design of hardware circuit and software flow design of family environment monitoring system based on CC2530 as the core, realizes in the home environment of temperature, humidity. Among them, the analog temperature, humidity, light sensor through the SCM processing output control action corresponding adjusting the corresponding parameters; SCM outputs corresponding protection control: instantaneous over current protection. This design uses Zigbee wireless network protocol, the system parameters of transmission and control, is also available with a PC real-time communication and monitoring.Key words: CC2530 Sensor Zigbee Environmental Monitoring目录第1章绪论 (1)1.1 本文研究背景与意义 (1)1.2 智能家居环境监测系统的特点 (1)1.3 国内外发展现状及分析 (2)1.4 典型无线网络技术介绍 (2)1.4.1 Zigbee技术 (2)1.4.2 Wi-Fi技术 (3)1.4.3 蓝牙技术 (3)1.5.1 本文主要研究内容 (3)1.5.2 本文主要研究创新点 (4)第2章Zigbee技术综述 (5)2.1 Zigbee技术介绍 (5)2.2 Zigbee技术的特点 (6)2.3 Zigbee网络设备组成和网络结构 (6)2.4 Zigbee协议分析 (7)2.4.1 网络层(NWK) (7)2.4.2 应用层(APP) (8)第3章家居环境监测系统方案 (11)3.1 系统结构 (11)3.2 系统功能定义 (12)3.3 系统设计要求 (12)第4章家居环境监测系统硬件设计 (14)4.1 系统电源电路 (14)4.2 Zigbee芯片CC2530 (15)4.3 家居环境参数采集模块 (15)4.3.1 数字温湿度传感器DHT11 (15)4.3.2 烟雾传感器MQ-2 (16)4.4 CC2530通讯 (17)4.5 LCD液晶显示模块 (18)第5章系统软件设计 (19)5.1 Zigbee无线通讯协议 (19)5.2 温湿度传感器程序 (20)5.3 烟雾传感器程序 (20)第6章系统性能测试与评述 (21)6.1 硬件测试 (21)6.2 软件测试 (21)第7章结论与展望 (22)7.1 结论 (22)7.2 展望 (22)总结 (23)参考文献 (24)致谢 (25)附录 (26)附录A 外文文献 (26)附录B 中文翻译 (34)附录C 程序 (39)第1章绪论1.1 本文研究背景与意义千百年来,人类都在关注着自身的生活和居住条件,并努力改善和提高之。
ZigBee网络安全性分析孙静【摘要】ZigBee是一项新兴的短距离无线通信技术,是一种无线个域网.介绍了ZigBee网络的安全机制,描述了ZigBee的信任中心和安全密钥,详细分析了ZigBee网路的安全建立过程,以及密钥建立协议和认证协议:SKKE和MEA协议.【期刊名称】《电脑与电信》【年(卷),期】2010(000)011【总页数】3页(P38-40)【关键词】ZibBee;安全性;TC;Key【作者】孙静【作者单位】吉林师范大学计算机学院,吉林,四平,136000【正文语种】中文1.引言ZigBee技术是一种近距离、低复杂度、低功耗、低速率、低成本的双向无线通信技术[1-3],工作在2.4GHz的ISM频段上,传输速率为20 kb/s-250 kb/s,传输距离为10m-75 m。
Zigbee网络可由多达65 000个无线数传模块组成,在整个网络范围内,它们可以相互通信,也可与现有的其它各种网络连接,范围最大达几公里[2,3],主要适合于工业控制、传感和远程控制、智能建筑等领域。
2.ZigBee网络的安全架构ZigBee标准建立在IEEE 802.15.4标准基础上,包含物理层(PHY)、媒体访问控制层(MAC)、网络层、应用层,并定义了安全服务提供机制。
物理层、媒体访问控制层则由IEEE 802.15.4标准定义。
ZigBee安全体系结构使用IEEE802.15.4的安全服务,利用这些安全服务对传输的数据进行加密处理,并提供对接入网络的设备的身份认证、密钥管理等功能。
ZigBee联盟定义的NWK、APS都包含该安全体系,他们采用128位的AES加密,CCM*模式,以及相应的密钥机制保证ZigBee网络的安全性[2,3]。
ZigBee网络的安全架构如图1所示。
图1 ZigBee的安全架构3.ZigBee网络安全分析3.1 802.15.4安全性分析IEEE802.15.4的安全机制是在MAC层实施的,应用通过在协议栈中设置恰当的参数表明采用了何种安全级,如果没有设置参数,那么默认没有采用安全措施。
ZIGBEE对网络传输内容用AES加密AES(The Advanced Encryption Standard)是美国国家标准与技术研究所用于加密电子数据的规范。
它被预期能成为人们公认的加密包括金融、电信和政府数字信息的方法。
AES是一个新的可以用于保护电子数据的加密算法。
明确地说,AES是一个迭代的、对称密钥分组的密码,它可以使用128、192和256位密钥,并且用128位(16字节)分组加密和解密数据。
与公共密钥密码使用密钥对不同,对称密钥密码使用相同的密钥加密和解密数据。
通过分组密码返回的加密数据的位数与输入数据相同。
迭代加密使用一个循环结构,在该循环中重复置换(permutations)和替换(substitutions)输入数据。
Z-stack对Zigbee2007提供了全面的支持,功能之强大,性能稳定、安全性高。
CC2530硬件支持128bit的AES加密算法,在协议栈中为了避开相同设备的干扰,和防止被其他设备监听,就必须采用这个技术将数据加密来提高数据的安全性。
1实验目的与器材实验目的本实验将利用Z-Stack2007协议栈构建一个简单的无线传感网络,对网络上传输的数据用AES进行加密,并且通过抓包软件对加密之前和之后的数据进行分析对比。
实验器材?3个CC2530开发模块(1个终端节点,1个协调器,1个抓包节点);2实验原理与步骤本实验以SensorDemo为实例程序,说明如何对传输的数据进行AES加密。
实验原理AES是一个迭代的、对称密钥分组的密码,它可以使用128、192和256位密钥,并且用128位(16字节)分组加密和解密数据。
Z-STACK中采用的是128bit的加密方式,并且在协议栈中实现了AES加密算法。
因此,如果需要对数据进行加密,仅需要在协议栈的配置文件中提供一个密钥,并且使能AES加密即可。
通过观察发现,加密后数据的长度和原始数据的长度是相关的。
例如,当原始数据长度为1~15字节时,加密后的数据所对应的长度相同;当原始数据长度为16~31字节时,加密后的数据所对应的长度相同,以此类推。
本科生毕业设计(论文)专业外文翻译原文:Microcontroller Based Home Automation System With Security译文:基与单片机的智能家居系统与安全性指导教师:职称:副教授学生姓名:学号: 1002120106专业:电气工程及其自动化院(系):机电工程学院2014年3月20日Microcontroller Based Home Automation System With SecurityAbstract:With advancement of technology things are becoming simpler and easier for us. Automatic systems are being preferred over manual system. This unit talks about the basic definitions needed to understand the Project better and further defines the technical criteria to be implemented as a part of this project.Keywords-component; Automation, 8051 microcontroller, LDR,LED, ADC, Relays, LCD display, Sensors, Stepper motorI.NTRODUCTIONA home automation system integrates electrical devices in ahouse with each other. The techniques employed in home automation include those in building automation as well as the control of domestic activities, such as home entertainment systems, houseplant and yard watering, pet feeding, changing the ambiance "scenes" for different events (such as dinners or parties), and the use of domestic robots. Devices may be connected through a computer network to allow control by apersonal computer, and may allow remote access from the internet.Typically, a new home is outfitted for home automation during construction, due to the accessibility of the walls, outlets, and storage rooms, and the ability to make design changes specifically to accommodate certain technologies. Wireless systems are commonly installed when outfitting a pre-existing house, as they reduce wiring changes. These communicate through the existing power wiring, radio, or infrared signals with a central controller. Network sockets maybe installed in every room like AC power receptacles. Although automated homes of the future have been staple exhibits for World's Fairs and popular backgrounds in science fiction, complexity, competition between vendors, multiple ncompatible standards and the resulting expense have limited the penetration of home automation to homes of the wealthy or ambitious hobbyists.II.HOME AUTOMATIONHome/office automation is the control of any or all electrical devices in our home or office, whether we are there or away. Home/office automation is one of the most exciting developments in technology for the home that has come along in decades. There are hundreds of products available today that allow us control over thedevices automatically, either by remote control; or even by voice command. Home automation (also called domotics) is the residential extension of "building automation". It is automation of the home, housework or household activity. Home automation may include centralized control of lighting, HV AC (heating,ventilation and air conditioning), appliances, and other systems,to provide improved convenience, comfort, energy efficiency and security. Disabled can provide increased quality of life for persons who might otherwise require caregivers or institutional care. Earlier, we looked into the face of future when we talked about automated devices, which could do anything on instigation of a controller, but today it has become a reality.III.NEED OF AUTOMATIONWith advancement of technology things are becoming simpler and easier for us. Automation is the use of control systems and information technologies to reduce the need for human work in the production of goods and services. In the scope of industrialization, automation is a step beyond mechanization. Whereas mechanization provided human operators with machinery to assist them with the muscularrequirements of work, automation greatly decreases the need for human sensory and mental requirements as well. Automation plays an increasingly important role in the world economy and in daily experience. Automatic systems are being preferred over manual ystem. Through this project we have tried to show automatic control of a house as a result of which power is saved to some extent.a) An automated device can replace good amount of human working force, moreover humans are more prone to errors and in intensive conditions the probability of error increases whereas, an automated device can work with diligence,versatility and with almost zero error.Replacing human operators in tasks that involve hard physical or monotonous work.Replacing humans in tasks done in dangerous environments (i.e. fire, space, volcanoes, nuclear facilities,underwater, etc)Performing tasks that are beyond human capabilities of size, weight, speed, endurance, etc.Economy improvement. Automation may improve in economy of enterprises,society or most of humankind. For example, when an enterprise that has invested in automation technology recovers its investment, or when a state or country increases its income due to automation like Germany or Japan in the 20th Century.b) This is why this project looks into construction and implementation of a system involving hardware to control a variety of electrical and electronics system.IV.SUPPY UNITA.Transformer:The main source of power(Fig 1) supply is a transformer. The maximum output power of power supply is dependent on maximum output power of transformer .We determine power from its current and voltage rating. e.g.: if there is a transformer of 12V, 500mA then maximum power delivered by transformer is 6Watt.It means we can drive a load from this transformer up to 6w. In our project our maximum power requirement is 1watt. So to provide this power we use 12V/250mA transformer. The maximum output power of this transformer is 4watt.it means it can easily drive load up to 4 watt.B.RectifierRectifier is a circuit which is used to convert ac to dc.Every electronic circuit requires a dc power supply for rectification. We have used four diodes.C.Input filter:After rectification we obtain dc supply from ac but it is not pure dc it may have some ac ripples .To reduce these ripples we use filters. It comprises of two filters –low frequency ripple filter and high frequency ripple filter. To reduce low frequency ripples we use electrolytic capacitor. The voltage rating of capacitor must be double from incoming dc supply. It blocks dc and passes ripples to ground.D.RegulatorInitial stage of every electronic circuit is power supply system which provides required power to drive the whole system. The specification of power supply depends on the power requirement and this requirement is determined by its rating. The main components used in supply system are.Regulator is a device which provides constant output voltage with varying inputvoltage. There are two types of regulators(a) Fixed voltage regulator(b) Adjustable regulatorWe have used fixed voltage regulator LM78XX last two digits signify output voltage. The voltage for our system is 5V that is why we have used 7805 regulator which provides 5V from 12V dc.E.Output filter:It is used to filter out output ripple if any.F.Output indicationWe use LED to observe the functioning of our system. If he LED glows it confirms proper functioning of our supply.We have used four power supply units.This supply is for the microcontroller,display and relay unit.The microcontroller requires 5 volt supply to perform any desired task.G.Control UnitTwo control units were used one for internal system and one for external system and these control unit based on ATMEL’sAT89S52 microcontroller(Fig 2). The given capture shows the pins and basic requirement of microcontroller to make it functional. Detailed description of the controller is 100uf / 50v.In addition, the AT89S52 is designed with static logic for operation down to zero frequency and supports two software electable power saving modes. The Idle Mode stops the CPUwhile allowing the RAM, timer/counters, serial port, and interrupt system to continue functioning.Mode saves the RAM contents but freezes the oscillator, disabling all other chip functions until the next interrupt or hardware reset.The Downloadable Flash can be changed a single byte at a time and is accessible through the SPI serial interface. Holding RESET active forces the SPI bus into a serial programming interface and allows the program memory to be written to or read from unless Lock Bit 2 has been activated.H.FeaturesCompatible with MCS-51™ProductsI.8KbytesofIn-SystemDownloadable Flash MemoryReprogrammableSPI Serial Interface for Program DownloadingEndurance: 1,000 Write/Erase Cycles4.0V to5.5V Operating RangeFully Static Operation: 0 Hz to 33 MHz56 x 8 bit Internal RAM32 Programmable I/O LinesThree 16 bit Timer/CountersEight Interrupt SourcesUll Duplex UART Serial ChannelLow Power Idle and Power Down ModesI .AdvantagesLess power consumptionLow costLess space requiredHigh speedFig 2-Chip BoardAT89S52 is an ATMEL controller with the core of Intel MCS-51. It has same pin configuration as give above. The AT89S52 is a low-power, high-performance CMOS 8-bit microcomputer with 8K bytes of Downloadable Flash programmable and erasable read only memory and 2K bytes of EEPROM. The device is manufactured using Atmel’s high density nonvolatile memory technology and is compatible with the industry standard 80C51 instruction set and pin out. The on-chip Downloadable Flash allows the program memory to be reprogrammed in-system through an SPI serial interface or by a conventional nonvolatile memory programmer. By combining a versatile 8-bit CPU with Downloadable Flash on a monolithic chip, the Atmel AT89S52 is a powerful microcomputer which provides a highly flexible and cost effective solution to many embedded control applications.The AT89S52 provides the following standard features: 8K bytes ofDownloadable Flash, 2K bytes of EEPROM, 256 bytes of RAM, 32 I/O lines, programmable watchdog timer, two Data Pointers, three 16-bit timer/counters, a six-vectorJ .Pin DescriptionVCC: Supply voltage. GND: Ground., Port 0: Port 0 is an 8-bit open drain bidirectional I/O port. As an output port, each pin can sink eight TTL inputs. When 1s are written to port 0 pins, the pins can be used as high impedance inputs. Port 0 can also be configured to be the multiplexed low-order address/data bus during accesses to external program and data memory. In this mode, P0 has internal pull-ups. Port 0 also receives the code bytes during Flash programming and outputs the code bytes during program verification. External pull-ups are required during program verification.Port 1: Port 1 is an 8-bit bidirectional I/O port with internal pull-ups. The Port 1 output buffers can sink/source four TTL inputs. When 1s are written to Port 1 pins, they are pulled high by the internal pull-ups and can be used as inputs. As inputs, Port 1 pins that are externally being pulled low will source current (IIL) because of the internal pull-ups.In addition, P1.0 and P1.1 can be configured to be the timer/counter 2 external count input (P1.0/T2) and the timer/counter 2 trigger input (P1.1/T2EX), respectively, as shown in the following table .Port 1 also receives the low-order address bytes during Flash programming and verification.Port 2: Port 2 is an 8-bit bidirectional I/O port with internal pull-ups. The Port 2 output buffers can sink/source four TTL inputs. When 1s are written to Port 2 pins, they are pulled high by the internal pull-ups and can be used as inputs. As inputs, Port 2 pins that are externally being pulled low will source current (IIL) because of the internal pull-ups. Port 2 emits the high-order address byte during fetches from external program memory and during accesses to external data memory that uses 16-bit addresses (MOVX @ DPTR). In this application, Port 2 uses strong internal pull-ups when emitting 1s. During accesses to external data memory that uses 8-bit addresses (MOVX @ RI), Port 2 emits the contents of the P2 Special Function Register. Port 2 also receives the high-order address bits and some control signalsduring Flash programming and verification. Port 3 Port 3 is an 8-bit bidirectional I/O port with internal pull-ups. The Port 3 output buffers can sink/source four TTL inputs. When 1s are written to Port 3 pins, they are pulled high by the internal pull-ups and can be used as inputs. As inputs,Port 3 pins that are externally being pulled low will source current (IIL) because of the pull-ups. Port 3 receives some control signals for Flash programming and verification. Port 3 also serves the functions of various special features of the AT89S52.RST: Reset input. A high on this pin for two machine cycles while the oscillator is running resets the device. This pin drives high for 98 oscillator periods after the Watchdog times out. The DISRTO bit in SFR AUXR (address 8EH) can be used to disable this feature. In the default state of bit DISRTO,the RESET HIGH out feature is enabled. ALE/PROG: Address Latch Enable (ALE) is an output pulse for latching the low byte of the address during accesses to external memory. This pin is also the program pulse input (PROG) during Flash programming. In normal operation, ALE is emitted at a constant rate of 1/6 the oscillator frequency and may be used for external timing or clocking purposes. Note,however, that one ALE pulse is skipped during each access to external data memory.If desired, ALE operation can be disabled by setting bit 0 of SFR location 8EH. With the bit set, ALE is active only during a MOVX or MOVC instruction. Otherwise, the pin is weakly pulled high. Setting the ALE-disable bit has no effect if the microcontroller is in external execution mode.PSEN: Program Store Enable (PSEN) is the read strobe to external program memory. When the AT89S52 is executing code from external program memory, PSEN is activated twice each machine cycle, except that two PSEN activations are skipped during each access to external data memory.EA/VPP: External Access Enable. EA must be strapped to GND in order to enable the device to fetch code from external program memory locations starting at 0000H up to FFFFH. Note, however, that if lock bit 1 is programmed, EA will be internally latched on reset. EA should be strapped to VCC for internal program executions.This pin also receives the 12-volt programming enable voltage (VPP) duringFlash programming.XTAL1: Input to the inverting oscillator amplifier and input to the internal clock operating circuit.XTAL2: Output from the inverting oscillator amplifier.H. Display UnitFig 3-Display UnitLiquid crystal displays (LCD) is an alphanumeric display and widely used in recent years as compared to LEDs. This is due to the declining prices of LCD, the ability to display numbers, characters and graphics, incorporation of a refreshing controller into the LCD, their by relieving the CPU of the task of refreshing the LCD and also the ease of programming for characters and graphics. We have used JHD162A advanced version of HD44780 based LCDs.V.WHAT CAN BE AUTOMATEDA.Virtually anything in the home/office that is powered by electricity can be automated and/or controlled. We can control our electrical devices. The password is given with the help of controller and can be changed by simply making a small change in the program and then burning the program in the controller.B.Counter dependent automatic switching system of roomAfter opening the lock when the person enters the room the counter gets incremented. Now if it is a day then the lights would not be switched on but if it is dark then the lights will automatically switch on. Now whatever may be the number of people entering the room the counter will automatically get incremented by itself and on leaving the room the counter will get decremented but the system will keep on working .Once the counter is zero in other words once everyone leaves the room the switching system will automatically stop working.C.Temperature controlled cooling systemOnce the person has entered the room he would not require to switch on anything everything will just happen automatically. Like if the temperature is high then the fan will switch on, on its own. Else it will remain in off state. This temperature is predefined by us in the controller. But this system will only work if there is a person in the room in other words if the counter is not zero.D.Light saving systemThis light saving system is used in two places for internal section and external section. If a person is not at home or sitting inside the room and it is dark outside then the lights will automatically get switched on and when its day the light will get switched off. This ensures power saving.Fire and Smoke sensorThis part detects any fire or smoke from a fire and set an alarm or an indication.VI. FEATURESPassword Based Locking SystemIn this system we have ensured a safe locking system. On seeing from outside the lock would not be visible but this inbuilt locking system ensures security. This lock can be opened and closed with the help of a password which we will give using a keypad. The door will only open or close only if the password is correct else it will remain in its original state. The lock cannot be broken because to the person standing Future of Automation: Future will be of Automation of all products. Each and every product will be smart devices that we use daily and that will be controlled through a smart chip called microcontrollers. Each and Every home appliances will be controlled either by PC or hand held devices like PDA or mobile handsets. Some examples of it are when you want you can switch on/off Fan of your home by mobile handset or PC.Smart Grid: Home automation technologies are viewed as integral additions to the Smart grid. The ability to control lighting, appliances, HV AC as well as Smart applications (load shedding, demand response, real-time power usage and price reporting) will become vital as Smart Grid initiatives are rolled out.VII. CONCLUSIONAn automated home can be a very simple grouping of controls, or it can be heavilyautomated where any appliance that is plugged into electrical power is remotely controlled. Costs mainly include equipment, components, furniture, and custom installation.Ongoing costs include electricity to run the control systems, maintenance costsfor the control and networking systems, including troubleshooting, and eventual cost of upgrading as standards change. Increased complexity may also increase maintenance costs for networked devices.Learning to use a complex system effectively may take significant time and training.Control system security may be difficult and costly to maintain, especially if the control system extends beyond the home, for instance by wireless or by connection to the internet or other networks.基与单片机的智能家居系统与安全性摘要:随着技术的进步的东西变得更简单,更容易为我们服务。
摘要基于GPS的位置服务已经给人们的生活带来许多便捷之处,随着生活品质的提升,室内定位技术应时而生。
然而,GPS信号功率较弱,很难穿透建筑物和空间障碍物,在室内定位领域已经不再适合。
如今,得益于短距离通信技术的飞速发展,室内定位技术迎来了机遇。
ZigBee技术是一种低成本、低功耗,高可靠性的短距离无线通信技术。
相比于其它技术,ZigBee具有自组网、网络容量大,并且在物联网解决方案领域有着不俗表现等优点。
在传统室内定位方法中,室内环境复杂多变,在定位过程中无法准确测量相关定位参数,从而导致室内定位精度偏低。
近些年,国内外学者相继使用指纹定位技术改善室内定位精度。
因此,论文中以ZigBee技术为依托,探究一种高精度,稳定性强的室内定位系统。
基于测距技术的室内定位方法一直是业界研究的重点。
此方法计算简单,容易实现,但结果却并非差强人意。
室内环境空间小,信号在传播过程中遭受的多径干扰严重,RSSI (Received signal strength indication)波动呈无规律性,导致在定位过程中无法将RSSI 准确的转化为距离信息。
因此,论文中进行了大量实验,探究天线角度,墙壁,障碍物与人体对RSSI波动的影响,在此基础上提出了改进的最大值滤波算法,并且用实验证明改进的滤波算法优于改进前。
不仅如此,论文中在三个不同的环境条件进行定位实验。
实验结果表明该方法稳定性较差,不适用于复杂环境下的室内定位,在4.4m*7m复杂环境下平均定位精度较低,仅为1.21m。
针对基于测距技术的室内定位方法在复杂环境下定位精度较低的问题,论文中提出了一种基于BP神经网络的室内定位方法。
该方法在离线阶段建立样本点的RSSI值与其位置坐标,并进行网络训练,在线阶段采集目标节点的RSSI数据,利用训练好的网络估计位置坐标。
实验结果表明,该方法改善了大部分目标节点的定位精度,但稳定性较差,在4.4m*7m复杂环境下最大定位误差为2.2289m,最小定位误差为0.2895m,平均定位精度为1.1407m。
智能网络通信评估对基于ZigBee的家庭区域网络攻击的威胁摘要:智能网络(SG)技术,旨在将世界上老龄化的网络带入二十一世纪。
为此,目前的网络需要强大的通信系统的叠加。
家庭局域网(HAN)是神光通信框架的一个重要组成部分,最终用户通过它的能够与电力供应商沟通。
在HAN中,通常有一个智能电表和电器。
最新的建议,大部分已商定使用IEEE 802.15.4无线技术ZigBee的智能电表和各种电器之间的称为HAN通信。
虽然ZigBee的提供了一些安全功能,该技术仍然受到一些安全漏洞,特别是SG HAN的情况。
在本文中,我们描述了针对ZigBee的HANIdentifier(HANId)冲突HAN通信的攻击和展示SG通讯上,通过计算机模拟攻击的影响。
最后,我们还设想一个适当的框架以防止攻击。
关键词:智能网络;ZigBee;安全。
1.引言最近在许多国家的的研究工作中,现在,着眼于转变成“智能”的现有公用网络(例如,电源线)。
智能网络(SG)的概念,是未来网络[1]的代名词,目的是在提供最终用户(即消费者)更加稳定和可靠的电力。
在SG,最终用户的设备预计将能够与公用事业供应商沟通,使他们可以表达自己的需要或对用电量的需求。
为此,电力供应商应该能够有效地沟通与最终用户的设备。
为了促进这一双向沟通,SG层次结构包括发电厂,配电站,以及不同的区域网络。
这些网络的范围从街道到家庭住宅区。
家庭局域网络,可以服务于多个电器。
因此,我们需要的家庭局域网络系统,以防止非法访问和各种各样的威胁。
家庭网络通常是基于IEEE802.15.4(ZigBee)无线技术,这可能会导致各种安全漏洞和攻击包括拒绝服务(DoS)攻击,恶意代码,等等。
在一个典型的家庭,一个用户可能有大量的电器,所有这些都需要连接到家庭网络的协调,与他们交换有关电力需求和使用的信息。
IEEE802.15.4或ZigBee规范[2]描绘便宜又省电的个人区域网络设备和无线介质访问协议。
基于ZigBee技术的无线射频识别系统的研究的开题报告一、选题意义和背景:近年来,物联网技术越来越受到重视,无线射频识别技术也随之发展。
ZigBee技术是一种基于低功耗无线网络和短距离数据传输技术的无线传感器网络。
其特点是低功耗,简单易用,可组成星型或网状拓扑结构,广泛应用于物联网中的传感器、测量、控制等领域。
射频识别技术是在物联网领域应用十分广泛的技术之一,可以应用于物品跟踪、库存管理、智能家居等领域。
在日常生活中,射频识别技术也被广泛应用于超市、酒店等场所的物品管理系统中,方便管理人员对商品的管理和盘点。
目前的射频识别系统存在一些问题,如识别范围狭窄、传输速率慢、功耗高等。
针对这些问题,本文将结合ZigBee技术,设计一种基于ZigBee技术的无线射频识别系统,提高识别范围和传输速率,并降低功耗。
本文的研究将对无线射频识别技术的发展和推广具有重要意义。
同时,也能对实际应用中的射频识别系统带来现实的改善。
二、研究内容:1. ZigBee技术的介绍。
2. 射频识别技术的原理。
3. 基于ZigBee技术的无线射频识别系统的设计思路。
4. 系统硬件的设计与实现,包括天线、ZigBee芯片、射频识别模块等。
5. 系统软件的设计与实现,包括数据传输、数据解析、数据处理等。
6. 实验测试与结果分析,评估系统的性能与实用性。
三、研究方法和步骤:1. 查阅相关文献,对ZigBee技术和射频识别技术进行深入了解,了解国内外当前技术发展进展状况。
2. 设计系统的硬件结构,包括天线、ZigBee芯片、射频识别模块等。
3. 设计系统的软件结构,包括数据传输、数据解析、数据处理等。
4. 基于硬件和软件,进行系统的集成测试和性能测试。
5. 对实验结果进行分析和总结,评价系统的性能与实用性。
四、预期成果:1. 设计出基于ZigBee技术的无线射频识别系统原型,并进行测试,并评估其性能和实用性。
2. 发表相关学术论文或期刊文章一篇,介绍设计思路及实验结果。
毕业设计(论文)译文及原稿免费下载,免费分享。
让论文写得更简单,更舒适。
更容易……译文题目ZigBee:无线技术,低功耗传感器网络原稿题目ZigBee: Wireless Technology for Low-Power Sensor Networks原稿出处电子文献ZigBee:无线技术,低功耗传感器网络加里莱格美国东部时间2004年5月6日上午12:00技师(工程师)们在发掘无线传感器的潜在应用方面从未感到任何困难。
例如,在家庭安全系统方面,无线传感器相对于有线传感器更易安装。
而在有线传感器的装置通常占无线传感器安装的费用80%的工业环境方面同样正确(适用)。
而且相比于有线传感器的不切实际甚至是不肯能而言,无线传感器更具应用性。
虽然,无线传感器需要消耗更多能量,也就是说所需电池的数量会随之增加或改变过于频繁。
再加上对无线传感器由空气传送的数据可靠性的怀疑论,所以无线传感器看起来并不是那么吸引人。
一个低功率无线技术被称为ZigBee,它是无线传感器方程重写,但是。
一个安全的网络技术,对最近通过的IEEE 802.15.4无线标准(图1)的顶部游戏机,ZigBee的承诺,把无线传感器的一切从工厂自动化系统到家庭安全系统,消费电子产品。
与802.15.4的合作下,ZigBee提供具有电池寿命可比普通小型电池的长几年。
ZigBee设备预计也便宜,有人估计销售价格最终不到3美元每节点,。
由于价格低,他们应该是一个自然适应于在光线如无线交换机,无线自动调温器,烟雾探测器和家用产品。
(图1)虽然还没有正式的规范的ZigBee存在(由ZigBee联盟是一个贸易集团,批准应该在今年年底),但ZigBee的前景似乎一片光明。
技术研究公司In-Stat/MDR在它所谓的“谨慎进取”的预测中预测,802.15.4节点和芯片销售将从今天基本上为零,增加到2010年的165万台。
不是所有这些单位都将与ZigBee结合,但大多数可能会。
Zigbee Wireless Sensor Network in Environmental MonitoringApplicationsI. ZIGBEE TECHNOLOGYZigbee is a wireless standard based on IEEE802.15.4 that was developed to address the unique needs of most wireless sensing and control applications. Technology is low cost, low power, a low data rate, highly reliable, highly secure wireless networking protocol targeted towards automation and remote control applications. It’s depicts two key performance characteristics – wireless radio range and data transmission rate of the wireless spectrum. Comparing to other wireless networking protocols such as Bluetooth, Wi-Fi, UWB and so on, shows excellent transmission ability in lower transmission rate and highly capacity of network.A. Zigbee FrameworkFramework is made up of a set of blocks called layers.Each layer performs a specific set of services for the layer above. As shown in Fig.1. The IEEE 802.15.4 standard defines the two lower layers: the physical (PHY) layer and the medium access control (MAC) layer. The Alliance builds on this foundation by providing the network and security layer and the framework for the application layer.Fig.1 FrameworkThe IEEE 802.15.4 has two PHY layers that operate in two separate frequency ranges: 868/915 MHz and 2.4GHz. Moreover, MAC sub-layer controls access to the radio channel using a CSMA-CA mechanism. Its responsibilities may also include transmitting beacon frames, synchronization, and providing a reliable transmission mechanism.B. Zigbee’s TopologyThe network layer supports star, tree, and mesh topologies, as shown in Fig.2. In a star topology, the network is controlled by one single device called coordinator. The coordinatoris responsible for initiating and maintaining the devices on the network. All other devices, known as end devices, directly communicate with the coordinator. In mesh and tree topologies, the coordinator is responsible for starting the network and for choosing certain key network parameters, but the network may be extended through the use of routers. In tree networks, routers move data and control messages through the network using a hierarchical routing strategy. Mesh networks allow full peer-to-peer communication.Fig.2 Mesh topologiesFig.3is a network model, it shows that supports both single-hop star topology constructed with one coordinator in the center and the end devices, and mesh topology. In the network, the intelligent nodes are composed by Full Function Device (FFD) and Reduced Function Device (RFD). Only the FFN defines the full functionality and can become a network coordinator. Coordinator manages the network, it is to say that coordinator can start a network and allow other devices to join or leave it. Moreover, it can provide binding and address-table services, and save messages until they can be delivered.Fig.3 Zigbee network modelII.THE GREENHOUSE ENVIRONMENTAL MONITORINGSYSTEM DESIGNTraditional agriculture only use machinery and equipment which isolating and no communicating ability. And farmers have to monitor crops’ growth by themselves. Even if some people use electrical devices, but most of them were restricted to simple communication between control computer and end devices like sensors instead of wire connection, which couldn’t be strictly defined as wireless sens or network. Therefore, by through using sensor networks and, agriculture could become more automation, more networking and smarter.In this project, we should deploy five kinds of sensors in the greenhouse basement. By through these deployed sensors, the parameters such as temperature in the greenhouse, soil temperature, dew point, humidity and light intensity can be detected real time. It is key to collect different parameters from all kinds of sensors. And in the greenhouse, monitoring the vegetables growing conditions is the top issue. Therefore, longer battery life and lower data rate and less complexity are very important. From the introduction about above, we know that meet the requirements for reliability, security, low costs and low power.A. System OverviewThe overview of Greenhouse environmental monitoring system, which is made up by one sink node (coordinator), many sensor nodes, workstation and database. Mote node and sensor node together composed of each collecting node. When sensors collect parameters real time, such as temperature in the greenhouse, soil temperature, dew point, humidity and light intensity, these data will be offered to A/D converter, then by through quantizing and encoding become the digital signal that is able to transmit by wireless sensor communicating node. Each wireless sensor communicating node has ability of transmitting, receiving function.In this WSN, sensor nodes deployed in the greenhouse, which can collect real time data and transmit data to sink node (Coordinator) by the way of multi-hop. Sink node complete the task of data analysis and data storage. Meanwhile, sink node is connected with GPRS/CDMA can provide remote control and data download service. In the monitoring and controlling room, by running greenhouse management software, the sink node can periodically receives the data from the wireless sensor nodes and displays them on monitors.B. Node Hardware DesignSensor nodes are the basic units of WSN. The hardware platform is made up sensor nodes closely related to the specific application requirements. Therefore, the most important work is the nodes design which can perfect implement the function of detecting and transmission as a WSN node, and perform its technology characteristics. Fig.4 shows the universal structure of the WSN nodes. Power module provides the necessary energy for the sensor nodes. Data collection module is used to receive and convert signals of sensors. Data processing and control module’s functions are node device control, task sche duling, and energy computing and so on. Communication module is used to send data between nodes and frequency chosen and so on.Fig.4 Universal structure of the wsn nodesIn the data transfer unit, the module is embedded to match the MAC layer and the NET layer of the protocol. We choose CC2430 as the protocol chips, which integrated the CPU, RF transceiver, net protocol and the RAM together. CC2430 uses an 8 bit MCU (8051), and has 128KB programmable flash memory and 8KB RAM. It also includes A/D converter, some Timers, AES128 Coprocessor, Watchdog Timer, 32K crystal Sleep mode Timer, Power on Reset, Brown out Detection and 21I/Os. Based on the chips, many modules for the protocol are provided. And the transfer unit could be easily designed based on the modules.As an example of a sensor end device integrated temperature, humidity and light, the design is shown in Fig. 5.Fig.5 The hardware design of a sensor nodeThe SHT11is a single chip relative humidity and temperature multi sensor module comprising a calibrated digital output. It can test the soil temperature and humidity. The DS18B20 is a digital temperature sensor, which has 3 pins and data pin can link MSP430 directly. It can detect temperature in greenhouse. The TCS320is a digital light sensor. SHT11, DS18B20and TCS320are both digital sensors with small size and low power consumption. Other sensor nodes can be obtained by changing the sensors.The sensor nodes are powered from onboard batteries and the coordinator also allows to be powered from an external power supply determined by a jumper.C. Node Software DesignThe application system consists of a coordinator and several end devices. The general structure of the code in each is the same, with an initialization followed by a main loop.The software flow of coordinator, upon the coordinator being started, the first action of the application is the initialization of the hardware, liquid crystal, stack and application variables and opening the interrupt. Then a network will be formatted. If this net has been formatted successfully, some network information, such as physical address, net ID, channel number will be shown on the LCD. Then program will step into application layer and monitor signal. If there is end device or router want to join in this net, LCD will shown this information, and show the physical address of applying node, and the coordinator will allocate a net address to this node. If the node has been joined in this network, the data transmitted by this node will be received by coordinator and shown in the LCD.The software flow of a sensor node, as each sensor node is switched on, it scans allchannels and, after seeing any beacons, checks that the coordinator is the one that it is looking for. It then performs a synchronization and association. Once association is complete, the sensor node enters a regular loop of reading its sensors and putting out a frame containing the sensor data. If sending successfully, end device will step into idle state; by contrast, it will collect data once again and send to coordinator until sending successfully.D. Greenhouse Monitoring Software DesignWe use VB language to build an interface for the test and this greenhouse sensor network software can be installed and launched on any Windows-based operating system. It has 4 dialog box selections: setting controlling conditions, setting Timer, setting relevant parameters and showing current status. By setting some parameters, it can perform the functions of communicating with port, data collection and data viewing.Zigbee无线传感器网络在环境监测中的应用I.Zigbee技术Zigbee是一种基于IEEE802.15.4的无线标准上被开发用来满足大多数无线传感和控制应用的独特需求。
长春理工大学学报(自然科学版)Journal of Changchun University of Science and Technology (Natural Science Edition )Vol.42No.4Aug.2019第42卷第4期2019年8月收稿日期:2018-11-09基金项目:国家自然科学基金青年基金(61705018);国家自然科学基金(61805025)作者简介:刘美琦(1995-),女,硕士研究生,E-mail :1109084027@ 通讯作者:王加科(1983-),男,博士,讲师,E-mail :wangjk5013@基于ZigBee 无线通信的靶标温度数据传输系统设计刘美琦1,何峰2,姜丽辉2,左乐2,王加科1(1.长春理工大学光电工程学院,长春130022;2.上海航天控制技术研究所,上海201109)摘要:为了评价恶劣环境条件下红外光学系统的探测性能,通过模拟各种大型物体的热辐射,研制了一种可无线传输的红外靶标系统数据传输系统。
首先,基于ZigBee 无线通信原理,设计了由总控计算机、数据中继站、靶板系统等三级通信结构组成的无线数据传输系统;然后以ARM 为核心处理器设计了高速串行A/D 模数转换的硬件采集卡,可将各个靶标单元的温度数据通过无线传输至中继计算机;进而,基于TI 公司CC2530芯片设计了靶板通信模块与中继站之间传输的协调组硬件,又基于VC++开发了包含靶板终端、路由器、协调器三部分通信的上位机软件;最后,通过中继站与上位机通信由总控上位机显示,监控每个靶元温控情况。
该种基于Zigbee 无线通信的靶标温度数据传输系统,具有网络节点组合灵活、空间假设次序无要求,且可大量减少系统中数据传输线路的优点,其无线传输距离在100m 内有效。
关键词:热辐射;ZigBee 无线通信;数据传输;CC2530中图分类号:O482.31文献标识码:A文章编号:1672-9870(2019)04-0050-05Target Temperature Data Transmission SystemBased ZigBee ProtocolLIU Meiqi 1,HE Feng 2,JIANG Lihui 2,ZUO Le 2,WANG Jiake 1(1.School of Optoelectronic Engineering ,Changchun University of Science and Technology ,Changchun 130022;2.Shanghai Aerospace Control Technology Institute ,Shanghai 201109)Abstract :In order to evaluate the detection performance of infrared optical systems under harsh environmental condi-tions ,this paper develops a wireless target system that can be transmitted wirelessly by simulating the thermal radiation of various large objects.Firstly ,based on the principle of ZigBee wireless communication ,a wireless data transmission system composed of a three-level communication structure such as a total control computer ,a data relay station and a target board system is designed.Then ,a high-speed serial A/D analog-to-digital conversion hardware acquisition card is designed with ARM as the core processor ,and the temperature data of each target unit can be wirelessly transmitted to the relay computer ;Furthermore ,based on TI's CC2530chip ,the coordination group hardware transmitted between the target communication module and the relay station is designed.Based on VC++,the upper computer software including the target terminal ,router and coordinator is developed.Finally ,communication with the host computer through the re-lay station is displayed by the master control unit to monitor the temperature control of each target unit.The target temperature data transmission system based on Zigbee wireless communication has the advantages of flexible network node combination ,no spatial hypothesis order ,and can greatly reduce the advantages of the data transmission line in the system ,and the wireless transmission distance is effective within 100m.Key words :heat radiation ;ZigBee wireless communication ;data transmission ;CC2530红外技术是研究红外辐射的产生、传输、转换探测及应用的一种高新技术,在科学研究、国防和国民经济中得到了广泛的应用。
摘要高校实验室存放着许多精密的科研仪器和一些易燃、易爆的实验物品,而且实验室使用频繁,容易造成突发性事故的发生,在严重威胁到科研人员人身安全的同时,也给学校带来巨大的财产损失。
因此,如何保证实验器材安全可靠,保证危险物品安全存放,尽可能消除对人身和财产的安全隐患,已经成为社会关注的问题。
在此背景下,本文设计了智能实验室监控系统,该系统通过ZigBee无线通信技术,实现实验室环境的全覆盖。
通过使用温湿度传感器、光照度传感器、火焰传感器、气体传感器、人体红外传感器等多种传感设备对实验室环境进行监测。
通过由ZigBee模块和WiFi模块组成的网关完成终端与上层应用之间的数据传输,结合OneNET物联网开放平台的数据接收与处理能力,实现整个系统的环境监测功能。
与传统的监控系统相比,本系统使用无线通信技术和各种传感器,可解决传统监控系统中布线困难、适应性不强等问题。
通过测试,在ZigBee网络节点的有效覆盖空间内,传感网络能够很快建立起来,并可以实时有效的进行数据采集和传输。
系统安装维护简单,用户界面友好,并且具有良好的可扩展性,能够及时发现各种安全隐患从而保障实验室的正常使用,降低管理人员的工作强度,提高实验室管理工作的信息化水平。
关键词:CC2530;物联网;远程监测;OneNETAbstractIn university laboratories,there are many precise scientific research instruments and some flammable,explosive and other dangerous items,and the laboratory is frequently used,often with sudden accidents,which not only seriously threaten the personal safety of scientific researchers,but also bring huge property losses to the University.Therefore,how to ensure the safety and reliability of laboratory equipment,ensure the safe storage of dangerous goods,and eliminate the hidden dangers of personal and property as far as possible has become a concern of the society.Under this background,an intelligent laboratory monitoring system is designed in this paper.ZigBee wireless communication technology is used to achieve full coverage of the laboratory environment.Temperature and humidity sensors,light intensity sensors,flame sensors,gas sensors,human body infrared sensors and other sensing equipment are used to monitor the laboratory environment.The data transmission between the terminal and the upper layer application is completed through the gateway composed of ZigBee module and WiFi module.The environmental monitoring and other functions of the whole system are realized through combining with the data reception and processing capabilities of the OneNET open platform for the Internet of Things.Compared with the traditional monitoring system,this system uses wireless communication technology and various sensors to solve the wiring difficulties and poor adaptability and so on.The test results show that the ZigBee network can be established in a short time,and can effectively collect and transmit data in real time in effective coverage space of ZigBee network nodes.The system has the advantages of simple installation and maintenance,friendly user interface and good scalability.It can discover various potential security risks in time to ensure the normal use of the laboratory,reduce the work intensity of management personnel,and improve the informatization level of laboratory management.Key Words:CC2530;the Internet of Things;remote monitoring;OneNET目录摘要 (I)Abstract (II)目录 (III)第一章绪论 (1)1.1研究背景 (1)1.2国内外研究现状 (2)1.3研究目的及意义 (3)1.4本文结构安排 (4)第二章实验室监测系统的总体设计与相关技术 (5)2.1系统总体架构 (5)2.2ZigBee技术简介 (7)2.2.1ZigBee技术特点 (7)2.2.2ZigBee设备类型及拓扑结构 (8)2.2.3ZigBee协议规范简介 (9)2.3WiFi技术 (10)2.4本章小结 (11)第三章系统硬件设计 (12)3.1系统终端节点的硬件设计 (12)3.1.1DHT11温湿度传感器模块 (12)3.1.2MQ-2有毒气体传感器模块 (13)3.1.3BH1750光强度传感器模块 (14)3.1.4火焰传感器模块 (15)3.1.5人体红外传感器模块 (16)3.2ZigBee无线网络硬件组成 (18)3.2.1CC2530F256芯片 (18)3.2.2CC2530功能底板 (20)3.3WiFi硬件模块 (21)3.4本章小结 (24)第四章系统软件设计 (25)4.1ZigBee节点的软件设计 (25)4.1.1Z-Stack协议栈运行流程 (25)4.1.2协调器节点程序设计 (26)4.2ZigBee-WiFi网关程序设计 (27)4.3ZigBee终端传感器程序设计 (28)4.3.1DHT11温湿度采集部分设计 (28)4.3.2MQ-2有毒气体采集部分设计 (30)4.3.3光照度采集部分设计 (30)4.3.4火焰传感器与人体红外传感器程序设计 (31)4.4ZigBee终端传感器程序设计 (32)4.5本章小结 (35)第五章系统软件测试与实现 (36)5.1ZigBee组网测试 (36)5.2传感器节点功能测试 (37)5.3ZigBee-WiFi网关联网功能测试 (39)5.4监测平台功能测试 (40)5.5本章小结 (41)第六章总结与展望 (42)参考文献 (43)致谢 (47)智能实验室监测系统的设计第一章绪论1.1研究背景实验室作为一所大学的心脏,承担着日常教学、培养科研人才、探索人类未知的重要角色。
Zigbee Wireless Sensor Network in Environmental MonitoringApplicationsI. ZIGBEE TECHNOLOGYZigbee is a wireless standard based on IEEE802.15.4 that was developed to address the unique needs of most wireless sensing and control applications. Technology is low cost, low power, a low data rate, highly reliable, highly secure wireless networking protocol targeted towards automation and remote control applications. It’s depicts two key performance characteristics – wireless radio range and data transmission rate of the wireless spectrum. Comparing to other wireless networking protocols such as Bluetooth, Wi-Fi, UWB and so on, shows excellent transmission ability in lower transmission rate and highly capacity of network.A. Zigbee FrameworkFramework is made up of a set of blocks called layers.Each layer performs a specific set of services for the layer above. As shown in Fig.1. The IEEE 802.15.4 standard defines the two lower layers: the physical (PHY) layer and the medium access control (MAC) layer. The Alliance builds on this foundation by providing the network and security layer and the framework for the application layer.Fig.1 FrameworkThe IEEE 802.15.4 has two PHY layers that operate in two separate frequency ranges: 868/915 MHz and 2.4GHz. Moreover, MAC sub-layer controls access to the radio channel using a CSMA-CA mechanism. Its responsibilities may also include transmitting beacon frames, synchronization, and providing a reliable transmission mechanism.B. Zigbee’s TopologyThe network layer supports star, tree, and mesh topologies, as shown in Fig.2. In a star topology, the network is controlled by one single device called coordinator. The coordinatoris responsible for initiating and maintaining the devices on the network. All other devices, known as end devices, directly communicate with the coordinator. In mesh and tree topologies, the coordinator is responsible for starting the network and for choosing certain key network parameters, but the network may be extended through the use of routers. In tree networks, routers move data and control messages through the network using a hierarchical routing strategy. Mesh networks allow full peer-to-peer communication.Fig.2 Mesh topologiesFig.3is a network model, it shows that supports both single-hop star topology constructed with one coordinator in the center and the end devices, and mesh topology. In the network, the intelligent nodes are composed by Full Function Device (FFD) and Reduced Function Device (RFD). Only the FFN defines the full functionality and can become a network coordinator. Coordinator manages the network, it is to say that coordinator can start a network and allow other devices to join or leave it. Moreover, it can provide binding and address-table services, and save messages until they can be delivered.Fig.3 Zigbee network modelII.THE GREENHOUSE ENVIRONMENTAL MONITORINGSYSTEM DESIGNTraditional agriculture only use machinery and equipment which isolating and no communicating ability. And farmers have to monitor crops’ growth by themselves. Even if some people use electrical devices, but most of them were restricted to simple communication between control computer and end devices like sensors instead of wire connection, which couldn’t be strictly defined as wireless sens or network. Therefore, by through using sensor networks and, agriculture could become more automation, more networking and smarter.In this project, we should deploy five kinds of sensors in the greenhouse basement. By through these deployed sensors, the parameters such as temperature in the greenhouse, soil temperature, dew point, humidity and light intensity can be detected real time. It is key to collect different parameters from all kinds of sensors. And in the greenhouse, monitoring the vegetables growing conditions is the top issue. Therefore, longer battery life and lower data rate and less complexity are very important. From the introduction about above, we know that meet the requirements for reliability, security, low costs and low power.A. System OverviewThe overview of Greenhouse environmental monitoring system, which is made up by one sink node (coordinator), many sensor nodes, workstation and database. Mote node and sensor node together composed of each collecting node. When sensors collect parameters real time, such as temperature in the greenhouse, soil temperature, dew point, humidity and light intensity, these data will be offered to A/D converter, then by through quantizing and encoding become the digital signal that is able to transmit by wireless sensor communicating node. Each wireless sensor communicating node has ability of transmitting, receiving function.In this WSN, sensor nodes deployed in the greenhouse, which can collect real time data and transmit data to sink node (Coordinator) by the way of multi-hop. Sink node complete the task of data analysis and data storage. Meanwhile, sink node is connected with GPRS/CDMA can provide remote control and data download service. In the monitoring and controlling room, by running greenhouse management software, the sink node can periodically receives the data from the wireless sensor nodes and displays them on monitors.B. Node Hardware DesignSensor nodes are the basic units of WSN. The hardware platform is made up sensor nodes closely related to the specific application requirements. Therefore, the most important work is the nodes design which can perfect implement the function of detecting and transmission as a WSN node, and perform its technology characteristics. Fig.4 shows the universal structure of the WSN nodes. Power module provides the necessary energy for the sensor nodes. Data collection module is used to receive and convert signals of sensors. Data processing and control module’s functions are node device control, task sche duling, and energy computing and so on. Communication module is used to send data between nodes and frequency chosen and so on.Fig.4 Universal structure of the wsn nodesIn the data transfer unit, the module is embedded to match the MAC layer and the NET layer of the protocol. We choose CC2430 as the protocol chips, which integrated the CPU, RF transceiver, net protocol and the RAM together. CC2430 uses an 8 bit MCU (8051), and has 128KB programmable flash memory and 8KB RAM. It also includes A/D converter, some Timers, AES128 Coprocessor, Watchdog Timer, 32K crystal Sleep mode Timer, Power on Reset, Brown out Detection and 21I/Os. Based on the chips, many modules for the protocol are provided. And the transfer unit could be easily designed based on the modules.As an example of a sensor end device integrated temperature, humidity and light, the design is shown in Fig. 5.Fig.5 The hardware design of a sensor nodeThe SHT11is a single chip relative humidity and temperature multi sensor module comprising a calibrated digital output. It can test the soil temperature and humidity. The DS18B20 is a digital temperature sensor, which has 3 pins and data pin can link MSP430 directly. It can detect temperature in greenhouse. The TCS320is a digital light sensor. SHT11, DS18B20and TCS320are both digital sensors with small size and low power consumption. Other sensor nodes can be obtained by changing the sensors.The sensor nodes are powered from onboard batteries and the coordinator also allows to be powered from an external power supply determined by a jumper.C. Node Software DesignThe application system consists of a coordinator and several end devices. The general structure of the code in each is the same, with an initialization followed by a main loop.The software flow of coordinator, upon the coordinator being started, the first action of the application is the initialization of the hardware, liquid crystal, stack and application variables and opening the interrupt. Then a network will be formatted. If this net has been formatted successfully, some network information, such as physical address, net ID, channel number will be shown on the LCD. Then program will step into application layer and monitor signal. If there is end device or router want to join in this net, LCD will shown this information, and show the physical address of applying node, and the coordinator will allocate a net address to this node. If the node has been joined in this network, the data transmitted by this node will be received by coordinator and shown in the LCD.The software flow of a sensor node, as each sensor node is switched on, it scans allchannels and, after seeing any beacons, checks that the coordinator is the one that it is looking for. It then performs a synchronization and association. Once association is complete, the sensor node enters a regular loop of reading its sensors and putting out a frame containing the sensor data. If sending successfully, end device will step into idle state; by contrast, it will collect data once again and send to coordinator until sending successfully.D. Greenhouse Monitoring Software DesignWe use VB language to build an interface for the test and this greenhouse sensor network software can be installed and launched on any Windows-based operating system. It has 4 dialog box selections: setting controlling conditions, setting Timer, setting relevant parameters and showing current status. By setting some parameters, it can perform the functions of communicating with port, data collection and data viewing.Zigbee无线传感器网络在环境监测中的应用I.Zigbee技术Zigbee是一种基于IEEE802.15.4的无线标准上被开发用来满足大多数无线传感和控制应用的独特需求。
ZigBee组网的温度数据采集器的设计汪燕【期刊名称】《计算机与现代化》【年(卷),期】2012(0)8【摘要】In industrial and agricultural production, the wireless network data acquisition is widely used, often requiring continu-ous work and low power. The wireless data-acquisition node, one of the key technologies, is designed based on ZigBee protocol in the paper. The networking course based on the cluster-tree routing protocol, and data transfer processes are also given in detail. The chip interface extension of the node is explained. In addition, a data acquisition application layer protocol is described, which facilitates the transfer of data and control. The practice shows that this design is stable and reliable, and it can be applied for a plurality of data acquisition applications.%工农业生产中常需要长时间低功耗的无线数据组网采集,节点设计是关键技术之一.本文设计一种基于ZigBee技术的无线数据采集的功能节点,给出基于簇树路由协议的组网和数据传输过程,并对节点芯片的扩展方案做了说明.本文还设计一种应用层数据采集协议,方便了数据的传输与控制.实践表明这种设计稳定可靠,可用于多数据点的采集应用.【总页数】4页(P101-104)【作者】汪燕【作者单位】江苏科技大学南徐学院,江苏镇江212004【正文语种】中文【中图分类】TP399【相关文献】1.基于Zigbee的多路温度数据无线采集系统设计 [J], 丁凡;周永明2.基于ZigBee多节点无线温度数据采集系统设计 [J], 李建飞;王炜3.基于ZigBee的温度数据采集系统设计 [J], 罗俊;朱齐嫒4.zigBee无线温度数据采集系统设计 [J], 于博;丁高林;郑宾5.基于ZigBee无线通信的靶标温度数据传输系统设计 [J], 刘美琦;何峰;姜丽辉;左乐;王加科因版权原因,仅展示原文概要,查看原文内容请购买。
Research of ZigBee’s data security and protectionLi Chunqing1, Zhang Jiancheng11College of Computer Science and Software,Tianjin Polytechnic University, NO.63 in Chenglinzhuang Road,Hedong District,Tianjin, 300160,Chinafranklcq@ABSTRACT: With the fast development of the wireless communication technology, the ZigBee technology, as a new short-distance wireless network technology, has been used much more widely in the area of wireless network. Its security meets not only confidentiality, but also low-power, low complexity, low-cost and so on. Therefore, it is particularly important to study the data security protection of ZigBee technology deeply. This paper discusses the ZigBee’s Security system, wireless data transmission network and researches on the data encryption and decryption of the ZigBee technology. A number of existent issues and the future development of ZigBee technology have been analyzed and summarized. What’s more, in order to expand the range of ZigBee’s application, it is necessary to combine the ZigBee technology with IPv6.KEYWORDS: ZigBee technology; Wireless data transmission; encryption and decryption; CCM ModelI.INTRODUCTIONThe fast development of wireless communication and electronic device technology has urged the development and the application of low power loss, the low price and the multi-purpose miniature sensor. In general, along with signal distance enlargement, the cost of the equipment complexity, the power loss as well as the system is increasing. Compared with the existing kinds of wireless communication technologies, ZigBee technology will be the technology[1] of the lowest power loss and cost. Meanwhile, because of the ZigBee technology’s low data rate and small communication range, it has made the ZigBee technology be used in the small load data current capacity business.ZigBee alliance forecasts the main application domain, including industry control, consumption electronic installation, automobile automation, agricultural automation and medical device control. In many applications, it needs high security in the sensor network. Therefore, the security problem becomes the restriction of wireless sensor network’s development. In the paper, it mainly studies the ZigBee protocol stack architecture, the security key, the network architecture as well as the trust center which uses the safety mechanism to conduct the research, and proposes the existing questions in the security aspect as well as the trend of ZigBee technology development in security aspect.II.ZIGBEE SECURITY SYSTEMThe ZigBee equipment uses the IEEE 802.15.4 wireless protocol to communicate with others. This standard assigns two: Physical Layer (PHY) and Media Access Control Layer (MAC) [2].The ZigBee protocol stack is composed of the physical layer, the data link layer, the network layer (NWK) as well as the application layer (APL)[3].Physical layer takes charge of basic wireless correspondence which is made up of modulation, transmission, data encryption and acception. The link layer provides the equipment with Single-hop Communication as well as the reliable transmission and the communication’s security. The network layer mainly provides the general network function, for example, topology building and maintenance, addressing and security route. Application layer includes application support sub-layer, ZigBee equipment object and different kinds of application objects. Application support sub-layer supplies the security and the mapping management service. ZDO (ZigBee Device Object, ZigBee equipment object) is responsible for the equipment management, including the security policy and the safe configuration management. The application layer provides services for ZDO and the ZigBee application service.2009 International Forum on Computer Science-Technology and ApplicationsThis framework of the system includes protocol stack’s three safety mechanisms. MAC, NWK and APS (the APL level including one application support sub-layer) are responsible for the respective frame’s safety transmission. Moreover, the APS sub-layer provides services for the establishment and maintenance of security relationship. ZDO manages secure strategy and equipment security structure. Figure 1 has demonstrated the ZigBee protocolstack Full View.Figure 1. ZigBee protocol stack’s security architectureZigBee uses three basic keys, respectively the network key, the link key and the host key, which are used in the data encryption process. The network key can be applied in the data link layer, the network layer and the application layer while the main key and the link key are used in the application layer and its sub-layer.III. ZIGBEE WIRELESS DATA TRANSMISSIONNETWORKThe ZigBee standard has defined three types of equipments, which are the ZigBee Coordinator, the ZigBee router and the ZigBee terminal device. The ZigBee Coordinator is responsible for starting and configuring network, only one ZigBee Coordinator in a ZigBee network. The ZigBee router is one kind of the support connection equipments. There are many routers in a network. The router can retransmit the message to other equipments, but it does not support the ZigBee router in the star network. The ZigBee terminal device may carry out the related function, and reaches other correspond equipment using the network. ZigBee network framework is shown in Figure 2.ZigBee CoordinatorZigBee RouterZigBee Terminal EquipmentFigure 2. ZigBee network architectureSimply speaking, similar to CDMA and the GSM network, ZigBee is a high reliable wireless data transmission network. ZigBee data transmission module is similar to the Mobile network base stations. To ZigBee, its effective coverage scope is from 10 meters to 75meters. However, based on the size of actual transmitting power and a varietyof different application models, its scope can be extended to be several hundred meters, which can basically cover the home or office environment. ZigBee can be a wireless data transmission network platform which is composed of a maximum of 65000 nodes. In the entire network, each ZigBee node can communicate with each other. Based on this, the transmission distance of ZigBee can be extended from the standard 75meters.Different from the mobile communication CDMA network or the GSM net, the ZigBee network is mainly established for the industrial automation control data transmission [7]. Thus, it must have the characteristics of simplicity, easy-operating, reliability and low price. Its each base value is less than 1000RMB. However, mobilecommunication webmaster is built for the audio communication. Each base station costs generally above 1,000,000 Yuan. Each ZigBee node can not only regard itself as the monitoring object, for example its sensor carries on the data acquisition and monitoring directly, but also transfer automatically the data information which another node passes on. In addition, each ZigBee node (FFD) can also wirelessly connect many isolated sub-nodes which don’t transfer the network information in its own signal cover scope.IV.DATA ENCRYPTION AND DECRYPTIONThe ZigBee technology has provided different security policies in view of the different applications[4].These strategies exert separately on the data link layer, the network layer and the application layer, using the AES2128 encryption algorithm to guarantee data security under the CCM3 pattern. The CCM3 pattern is an improvement of the CCM pattern[5], which is made up of the Cipher Block Chaining Message Authentication Code (Ci-pher Block Chaining--MAC, CBC--MAC) pattern and the counter (Counter, CTR) pattern. CCM3 pattern execution includes input transformation, authentication transformation and encryption transformation, which use the following parameters:z A bit string key, its length keylen is 128;z The length of the authentication field M (0, 4, 6, 8, 10, 12, 14, 16);z The message field length L (2, 3, ⋯, 8);z The length of m byte string territory isl(m) byte, its value scope is 0≤ l (m) < 28L;z The length of N value domain is 15 - L, for at any one range when using the same key, N value isunique;z The length of da byte string territory is l (da) byte, its value scope is 0 ≤l (da) < 264;Their concrete realization of the process is as follows:A.Input TransformationInput transformation is as follows: inputing the encryption data m and data authentication da, by these following steps:1)Make sure a byte string’s field length l(da) bytes to form L (da) bytes string.a) L (da) = 0, then L (da) for the empty string;b) 0 <l (a) <216 - 28, then L (da) will encrypt l (da) of the two bytes;c) 216 - 28≤ l(da) <232, then L (da) is 0xff, 0xfe, and the four bytes of l (a) which will be encrypted to the right connection;d) 232≤ l (da) <264, then L (da) is 0xff, 0xff, and the8 bytes of l (da) which will be encrypted to the right connection.2) L (da), right to connect da forms the result string.3) Using the result string to form an additional authentication data (AddAtData), the Data is produced by right connection to non-negative zero; the additional data can be divided by 16.4) Using the same method to form an additional message data (PlainData), the data is formed by the way of connecting encrypted data m right to non-negative zero, the additional data must be divided by 16.5) Finally, authentication data (AuthData) is generated, which is composed of the data AddAtData and data PlainData, that is, To AuthData = AddAtData‖PlainData.B.Authentication TransformationAfter Data AuthData generated, transform it with signs. Their concrete realization of the process is as follows:1) to form a byte flag field (Flags), which is made up of 1 bit express reservation (Reserved), 1 bit Hdata, 3 bits M, and 3 bits L, namely: Flags = Reserved ‖ Hdata ‖M ‖ L.In the formula, 1 bit “Reserved” is used for future expansion when set to 0; when l (a) = 0 , a Adata will be set to 0, otherwise, will be set to 1; 3 L domains stand for an integer L - 1; when M> 0, 3 M domain stand for an integer (M - 2) / 2, otherwise, set to 0.2) generate 16 bytes B0 field, which is made up of 1 byte flag field (Flags), 15 - L bytes N domain and L bytes that is the length of the l (m) domain, namely: B0 = Flags ‖ N ‖ l (m).3) separate data AuthData into A1‖A2‖⋯‖At, where each data block is a 16-byte string, then the CBC-MAC value is defined as:X 0 = 0128, Xi + 1: = E(Xi⊕Ai,Key) f or i = 0, ⋯, tE(X,K) that the use of key K to encrypt the plaintext X by the function E; 0128 stand for that all the 16 bytes is 0. Then Seeking reauthentication mark T, which is a MAC value, by obtaining the front M bytes of the ciphertext Xi + 1, namely: T: = first-M-bytes (Xi + 1).C.Encryption TransformationWhen plaintext data (PlainData) and authentication flagT have been established, the process of using encrypt transformation to encryption is as follows:1) Generate a byte flag field (Flags), which is made up of 2 bits expressed reservations (Reserved), 3 integer bits 0 and 3 bits integer domain L, namely: Flags = Reserved ‖Reserved ‖ 0 ‖L .In the formula, 2 bits “Reserved” are used for future expansion when set to 0, 3 integer bits express L-1 and 3 bits zero domain express L;2) Generate 16 bytes Ai field, which is made up of 1 bits expressed byte flag field (Flags), 15-N bytes N domain and L bytes expressed integer i, namely:Ai = Flags ‖N‖ Counter i for i = 0, 1, 2 ⋯3) separate message data PlainData into M1‖M2‖⋯‖M t, where each message block Mi is a 16 b ytes string .ciphertext blocks C1, ⋯, Ct are defined as: Ci: = E(Ai, Key)⊕Mi for i = 1, 2, ⋯, t.4) Ciphertext comes from the left l (m) bytes of C1‖C2‖⋯‖Ct.5) Find the 16 bytes encryption blocks S0as: S0: = E(A0,Key ).6) Encrypted authentication symbol U is gained by the dense flow of Chi U of S0 with the left-most M-byte XOR authentication flag T . The specific value is as follows: U: = T⊕first-M-bytes (S0)If this operation is right, encrypted message c can be made up of connecting the ciphertext right to Encrypted authentication symbol, the last is output.D. Decryption TransformationAfter obtaining the encryption key K, the length of the M authentication domain and encryption message msg, you can decrypt the cipher text, the process is as follows:1) Resolve the receiving message msg into E‖U. The right-most string U is a M bytes string. If this operation fails, the output will be invalid and stopped. U is the encrypted authentication symbol; the length of left string E is l(msg) - M bytes.2) Generate an additional message CipherData. It is generated by the way of right connecting string C and non-negative zero. CipherData can be divisible by 16.3) Similarly, use encryption transformation process; enter the demand parameters “CipherData” and authentication symbol. Here, the decomposition of Ciphertext message is CipherData, it is broken down into each block Ci which is a 16 bytes string.4) The output string is N‖T. The right-most string Tis a M bytes string. T is the authentication mark.The l (msg )- M bytes string of the left-most string N is regarded as the output of the plaintext message.In short, ZigBee technology can ensure transmission of information security and prevent eavesdropping or interception of the attacker by utilizing a security policy. Thereby, it ensures the security of wireless transmission.V.CONCLUSIONThe key success of ZigBee technology is its abundance and convenient application. In security aspect, Literature [6] think the AES-128 encryption algorithms can ensure the data security of the ZigBee wireless transmission. Moreover, NIST also estimates that the AES - 128 encryptions can be at least used safely till year 2036[7]. But literature[8] think the sole symmetrical encryption algorithm possibly brings the security hidden danger in the data encryption and the key exchange. In view of this, the author has proposed an improved data encryption and decryption algorithm in order to ensure the data security of the ZigBee wireless transmission, on the base of the analysis of ZigBee security system and network structure. Meanwhile, the author suggests the elliptic curve public-key encryption method should be applied in ZigBee technology as non-symmetric plan[9].Because there is a huge address spaces in IPv6, so it can assign a global network address for each ZigBee node. Meanwhile, it can provide good QoS and safe communication support. Therefore, the combination of IPv6 and the ZigBee will be a hot spot in the future study.REFERENCES[1]Quanping Wang, Li Wang.The introduction of ZigBeetechnology[J].COMMUNICATIONS WORLD,2003,4(101):41--43.[2]Xiaopei Nie. The Analysis of ZigBee Standard’s SecurityServices Architecture[J]. Net Security Technologies andApplication,2009,2:43-45.[3]Lihua Xu,Yihuai Wang. The Design And Realize Of A ZigBeenetwork[J]. Control & Automation , 2007,23(11-2):72-73.[4]Xiuli Ren,Haibin Y u. Security Analysis for Wireless SensorNetworks Based on ZigBee[J]. Computer Science,200--6,33(10):111-113.[5]Housley R,Whiting D , Ferguson N. Counter with CBC--MAC(CCM) [DB/OL]. /groups/ST/toolkit/B--CM/documents/proposedmodes/ccm/ccm.pdf,Viewed on August3, 2009.[6]Ferguson N,Schneier B.Practical cryptography[M].NewYork:John Wiley and Sons,2003:97-120.[7]Krasner J. Using Elliptic Curve Cryptography( ECC) forEnhanced Embedded Security [EB/ OL],2004. http://embedded-/EMF-ECC-FINAL1204.pdf, Viewed on August 3,2009.[8]Ondrej H, Peter K, Petr F, et al.On security of PAN wirelesssystems[C].In Proc of 6th International Workshop on EmbeddedComputer Systems (SAMOS 2006),LNCS,V ol.4017. [s.l.]:Sp--ringerVerlag,2006:178-185.[9]Pereira R. ZigBee and ECC Secure Wireless Networks[EB/OL].2004. /Articles/ArticleID/83--69/8369.html, Viewed on August 3, 2009.。