Wireless Personal Area Networks
Performance, Interconnection, and Security with IEEE 802.15.4
Wireless Communications and Mobile Computing
1. Edition January 2008
336 Pages, Hardcover
Wiley & Sons Ltd
Short Description
Wireless Personal Area Networks: Performance, Interconnection, and Security with IEEE 802.15.4 provides an in-depth analysis of the recent IEEE 802.15.4 standard for low data rate wireless personal area networks (LR-WPANs), including suggestions to improve performance and comparisons with the related 802.15.1 (Bluetooth) standard. It also assesses the suitability of the standard for the development and deployment of wireless sensor networks as well as providing guidance and insight into the relative advantages and disadvantages of various performance solutions.
Wireless Personal Area Networks provides an in-depth analysis of the recent IEEE 802.15.4 standard for low data rate wireless personal area networks (LR-WPANs), including suggestions to improve performance and comparisons with the related 802.15.1 (Bluetooth) standard. It assesses the suitability of the standard for the development and deployment of wireless sensor networks as well as providing guidance and insight into the relative advantages and disadvantages of various performance solutions.
Wireless Personal Area Networks:
* Provides a comprehensive, in-depth look at the issues surrounding WPAN network operation and performance.
* Investigates multi-cluster networks and compares how they can be implemented.
* Analyzes the performance of a single cluster under different traffic and power management regimes including uplink vs. downlink traffic, acknowledged vs. unacknowledged traffic, saturation vs. non-saturation, and the like.
* Discusses security issues in WPANs such as different security threats, their impact on performance, standard security mechanisms, and security policies.
* Compares the IEEE 802.15.4 standard with the related Bluetooth IEEE 802.15.1 standard in terms of suitability for implementing wireless sensor networks.
This reference is a valuable tool for developers and researchers getting acquainted with various aspects of IEEE 802.15.4 technology. Graduate students studying courses such as Performance Evaluation, Wireless Sensor Networks and Queuing Theory will also find this book very insightful.
Preface
I Prologue: WPANs and 802.15.4 1
1 Wireless Personal Area Networks
1.1 Wireless Ad Hoc Networks
1.2 Design Goals for the MAC Protocol
1.3 Classification of MAC Protocols For Ad Hoc Networks
1.4 Contention-Based MAC Protocols
1.5 New Kinds of Ad Hoc Networks
1.6 Sensor Networks
2 Operation of the IEEE 802.15.4 network
2.1 Physical Layer Characteristics
2.2 Star Topology and Beacon Enabled Operation
2.3 Slotted CSMA-CA Medium Access
2.4 Acknowledging Successful Transmissions
2.5 Downlink Communication in Beacon Enabled Mode
2.6 Guaranteed Time Slots
2.7 Peer-to-Peer Topology and Non-Beacon Enabled Operation
2.8 Device Functionality and Cluster Formation
2.9 Format of the PHY and MAC frames
II Single-Cluster Networks
3 Cluster with Uplink Traffic
3.1 The System Model - Preliminaries
3.2 Superframe With an Active Period Only
3.3 Superframe With Both Active and Inactive Periods
3.4 Probability Distribution of the Packet Service Time
3.5 Probability Distribution of the Queue Length
3.6 Access Delay
3.7 Performance Results
4 Cluster With Uplink And Downlink Traffic
4.1 The System Model
4.2 Modeling the Behavior of the Medium
4.3 Probability Distribution For the Packet Service Time
4.4 Performance of the Cluster With Bidirectional Traffic
5 MAC Layer Performance Limitations
5.1 Congestion of Packets Deferred to The Next Superframe
5.2 Congestion After The Inactive Period
5.3 Congestion of Uplink Data Requests
5.4 Blocking of Uplink Data and Data Requests
5.5 Possible Remedies
6 Activity Management Through Bernoulli Scheduling
6.1 The Need For Activity Management
6.2 Analysis of Activity Management
6.3 Analysis of the Impact of MAC and PHY Layers
6.4 Controlling the Event Sensing Reliability
6.5 Activity Management Policy
7 Admission Control Issues
7.1 The Need for Admission Control
7.2 Performance Under Asymmetric Packet Arrival Rates
7.3 Calculating the Admission Condition
7.4 Performance of Admission Control
Summary and Further Reading
III Multi-Cluster Networks
8 Cluster InterconnectionWith Master-Slave Bridges
8.1 Analysis of Bridge Operation
8.2 Markov Chain Model for A Single Node
8.3 Performance of the Network
8.4 Network with a Single Source Cluster/Bridge
8.5 Network with Two Source Clusters/Bridges
8.6 Modeling the Transmission Medium and Packet Service Times
9 Equalization of Cluster Lifetimes
9.1 Modeling the Clusters
9.2 Distributed Activity Management
9.3 Energy Consumption in Interconnected Clusters
9.4 Performance of activity management
10 Cluster Interconnection with Slave-Slave Bridges
10.1 Operation of the SS Bridge
10.2 Markov Chain Model for the SS Bridge
10.3 Markov Chain for Non-Bridge Nodes
10.4 Performance Evaluation
10.5 To Acknowledge or Not To Acknowledge: The CSMA-CA Bridge
10.6 Thou Shalt Not Acknowledge: The GTS Bridge
10.7 Modeling the Transmission Medium and Packet Service Times
Summary and Further Reading
IV Security
11 Security in 802.15.4 Specification
11.1 Security Services
11.2 Auxiliary Security Header
11.3 Securing and Unsecuring Frames
11.4 Attacks
12 The Cost of Secure and Reliable Sensing
12.1 Analytical Model of a Generic Key Update Algorithm
12.2 Analysis of the Node Buffer
12.3 Success Probabilities
12.4 Key Update in a Multi-Cluster Network
12.5 Cluster Lifetime
12.6 Evaluation of Lifetimes and Populations
Summary and Further Reading
V Appendices
A An Overview of ZigBee
A.1 ZigBee Functionality
A.2 Device Roles
A.3 Network Topologies and Routing
A.4 Security
B Probability generating functions and Laplace transforms
Bibliography
Dr. Yi Pan is the Chair and a Professor in the Department of Computer Science at Georgia State University, USA. Dr. Pan received his B.Eng. and M.Eng. degrees in computer engineering from Tsinghua University , China, in 1982 and 1984, respectively, and his Ph.D. degree in computer science from the University of Pittsburgh, USA, in 1991. Dr. Pan's research interests include parallel and distributed computing, optical networks, wireless networks, and bioinformatics. Dr. Pan has published more than 100 journal papers with over 30 papers published in various IEEE journals. In addition, he has published over 130 papers in refereed conferences (including IPDPS, ICPP, ICDCS, INFOCOM, and GLOBECOM). He has also co-edited over 30 books. Dr. Pan has served as an editor-in-chief or an editorial board member for 15 journals including five IEEE Transactions and has organized many international conferences and workshops. Dr. Pan has delivered over 10 keynote speeches at many international conferences. He is an IEEE Distinguished Speaker (2000-2002), a Yamacraw Distinguished Speaker (2002), and a Shell Oil Colloquium Speaker (2002). He is listed in Men of Achievement, Who's Who in America, Who's Who in American Education, Who's Men of Achievement, Who's Who in America, Who's Who in American Education, Who's Who in Computational Science and Engineering,and Who's Who of Asian Americans.