ISO/IEC , CSD, IEEE a. Embedded Systems Lab. Dept. of CSE, PNU

Similar documents
Overview of the IEEE /4a standards for low data rate Wireless Personal Data Networks

CS263: Wireless Communications and Sensor Networks

Zigbee protocol stack overview

WPAN/WBANs: ZigBee. Dmitri A. Moltchanov kurssit/elt-53306/

Message acknowledgement and an optional beacon. Channel Access is via Carrier Sense Multiple Access with

Wireless Personal Area Networks (WPANs) Wireless PAN

LXRS and LXRS+ Wireless Sensor Protocol

KW41Z IEEE and BLE Coexistence Performance

Sensor Application for Museum Guidance

Wireless Sensor Networks

Guide to Wireless Communications, 3 rd Edition. Objectives

Wireless# Guide to Wireless Communications. Objectives

CHAPTER 3 BLUETOOTH AND IEEE

Outline. TWR Module. Different Wireless Protocols. Section 7. Wireless Communication. Wireless Communication with

standards like IEEE [37], IEEE [38] or IEEE [39] do not consider

Topics. Introduction Architecture Node Types Network Topologies Traffic Modes Frame Format Applications Conclusion

Principles of Wireless Sensor Networks. Medium Access Control and IEEE

IEEE Testing Signal Compliance of ZigBee Standard

Wireless Sensor Networks

DASH7 ALLIANCE PROTOCOL - WHERE RFID MEETS WSN. public

Positioning accuracy in Ultra Wide Band Low Data Rate networks of uncoordinated terminals

Wireless Body Area Networks. WiserBAN Smart miniature low-power wireless microsystem for Body Area Networks.

ISO/IEC INTERNATIONAL STANDARD

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols

Communication In Smart Grid -Part3

Mobile Communications

Networking Technologies and Applications

FeliCa Card User's Manual Excerpted Edition

COS 140: Foundations of Computer Science

Reference number of working document: ISO/IEC JTC 1/SC 31/WG 4 N 724

Data Link Layer, Part 3 Medium Access Control. Preface

EE 122: Ethernet and

Wireless Sensor Networks for Spacecraft DAMON PARSY, CEO OF BEANAIR

Wireless Sensor Networks

Strengthening Unlicensed Band Wireless Backhaul

Local Area Networks NETW 901

ENGI 4557 Digital Communications Practice Problems 2017 (Part 2)

An Active RFID Tag for Outdoor Billboard Management

WPAN-like Systems. UWB Ultra Wide Band. IrDA Infrared Data Association. Bluetooth. Z-Wave. WPAN Wireless Personal Area Network

A cluster based interference mitigation scheme for performance enhancement in IEEE

Project: IEEE P Working Group for Wireless Personal Area Networks N

Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1

EL2745 Principles of Wireless Sensor Networks

Principles of Wireless Sensor Networks

Wireless communication standards: What makes them unattractive for WSN:

1. IEEE and ZigBee working model.

ZIGBEE. Erkan Ünal CSE 401 SPECIAL TOPICS IN COMPUTER NETWORKS

Wireless Sensor Networks

Matteo Petracca Scuola Superiore Sant Anna, Pisa

Lecture 12 December 04, Wireless Access. Graduate course in Communications Engineering. University of Rome La Sapienza. Rome, Italy

Junseok Kim Wireless Networking Lab (WINLAB) Konkuk University, South Korea

Links. CS125 - mylinks 1 1/22/14

Data Link Layer, Part 5. Medium Access Control

WiMedia Ultra-wideband: Efficiency Considerations of the Effects of Protocol Overhead on Data Throughput. January All Rights Reserved.

Project: IEEE P Working Group for Wireless Personal Area Networks N

Radio Networks. Riccardo Cavallari. Radio Networks Office: 3 rd floor, Main Building

Eclipse IOT day April 3016 LoRa Overview. Wyres SAS 2016

Information technology Radio frequency identification for item management. Part 7: Parameters for active air interface communications at 433 MHz

original standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS

Outline. Lecture 16: Wireless Networking. Physical Layer (Layer 1) Ethernet: Wireless is Different. Attenuation Over Space

WIRELESS TECHNOLOGIES FOR THE INTERNET OF THINGS

CSMC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala. Fall 2018 CMSC417 Set 1 1

Wireless (NFC, RFID, Bluetooth LE, ZigBee IP, RF) protocols for the Physical- Data Link layer communication technologies

EECS Introduction to Computer Networking. Local Area Networks / Ethernet. Hub

WIRELESS TECHNOLOGIES

Z-Wave (ITU-T G.9959) Measurement Suite. Data Sheet

Introduction to IEEE

WIRELESS SENSOR NETWORK

Wireless Local Area Networks. Networks: Wireless LANs 1

Medium Access Control in Wireless Networks

MOBILE COMPUTING. Jan-May,2012. ALAK ROY. Assistant Professor Dept. of CSE NIT Agartala.

Topic 02: IEEE

Collision Avoidance through Multiple RTS/CTS Dialogue in RFID System

Victor Kwong Marketing Manager

ZigBee Technology: Wireless Control that Simply Works

Computer Networks Principles LAN - Ethernet

e-pg Pathshala Quadrant 1 e-text

ELEC / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition

Wireless Local Area Part 2

COS 140: Foundations of Computer Science

Simulative Investigation of Zigbee Network Coordinator Failure with Different QoS

Low Power Wide Area Network (LPWAN) Presented By: Dr. Hafiz Yasar Lateef Director, Telxperts Pty Ltd.

RF4431 wireless transceiver module

Chapter 1. Uses of Computer Networks Network Hardware Network Software Reference Models Example Networks Network Standardization. Revised: August 2011

MSIT 413: Wireless Technologies Week 8

Medium Access Control Sublayer Chapter 4

Wireless Protocols for IoT Part II: IEEE Wireless Personal Area Networks

Seminar: Mobile Systems. Krzysztof Dabkowski Supervisor: Fabio Hecht

Medium Access Control. CSCI370 Lecture 5 Michael Hutt New York Institute of Technology

Implementation and use of Software Defined Radio (SDR) technology for Public Safety, Traffic applications, and Highway Engineering

Links Reading: Chapter 2. Goals of Todayʼs Lecture. Message, Segment, Packet, and Frame

AIM: To create a project for implement a wireless communication protocol on an embedded system- ZigBee.

Data Link Layer Technologies

Internet Structure. network edge:

MOD-MRF24J40 development board Users Manual

AT THE END OF THIS SECTION, YOU SHOULD HAVE AN UNDERSTANDING OF THE

Modulation. Propagation. Typical frequency bands

MAC LAYER. Murat Demirbas SUNY Buffalo

Your favorite blog : (popularly known as VIJAY JOTANI S BLOG..now in facebook.join ON FB VIJAY

Traffic Modeling of Wireless Body Area Network

Transcription:

ISO/IEC 18000-7, Embedded Systems Lab. Dept. of CSE, PNU 2013.02.08

Schedule 주제 일정 Chapter 2. Transmission fundamentals 1/29 Chapter 6. Signal encoding techniques 2/5 ISO/IEC 18000-7, 2/8 Wireless Sensor Network 2/19 RFID (Radio Identification) 2/22 2

Contents Introduction ISO/IEC 18000-7 CSD Physical layer Data Link layer Tag collection and arbitration CSD system Encryption CSD requirement IEEE 802.15.4a Physical layer MAC sub-layer Summary Reference 3

Introduction Three standards ISO/IEC 18000-7 CSD IEEE 802.15.4a ISO/IEC 18000-7 CSD 433MHz wireless communication Container security IEEE 802.15.4a WPAN Revision IEEE 802.15.4 4

ISO/IEC 18000-7 Features 433Mhz band used Active RF tag RFID system defined by ISO/IEC 18000-7 Identify tag in range Read data / Write data Selection by group or address Handling of multiple tags in the field of view Error detection RFID equipment Interrogator Tag 5

Physical layer Typical characteristics Characteristic Carrier frequency Modulation type Frequency deviation Modulation rate Value 433.92MHz FSK +/- 50KHz 27.7KHz Wake up signal Figure 1. ISO/IEC 18000-7 characteristic Transmitted by the interrogator Minimum 2.4s, maximum 4.8s All tags within communication range shall enter into Ready state 6

Data link layer Packet format Preamble Data byte Final logic low Figure 2. ISO/IEC 18000-7 packet format Preamble 60 μs period twenty pulse 30 μs high, 30 μs low Final synchronization pulse Tag to interrogator 42 μs high, 54 μs low Interrogator to tag 54 μs high, 54 μs low Figure 3. ISO/IEC 18000-7 preamble 7

Data link layer (cont d) Data byte format Manchester code 8 data bit, 1 stop bit 36 μs period, total 324 μs period CRC bytes Calculated as a 16bit value Initialized 0x0000 All data bytes according to CCITT polynomial Excluding preamble Appended to the data as two bytes Packet end period Final period 36 μs of continuous logic low Figure 4. ISO/IEC 18000-7 data byte 8

Tag collection & arbitration Figure 5. ISO/IEC 18000-7 collection sequence and timing 9

Tag collection & arbitration (cont d) Tag arbitration mechanism Allocate tag reply transmissions into time slot Within a time window, Listen Period (LP) LP are contained within Collection Period (CP) WP CP(1) CP(2) CP(p) SP(p) LP(p) AP(p) TS(p,1) TS(p,2) TS(p, Dp) AP(p,1) AP(p,2) AP(p, Dp) Figure 6. ISO/IEC 18000-7 anti collision scheme timing diagram 10

Tag collection & arbitration (cont d) Tag arbitration mechanism (cont d) Begins when interrogator transmit a collection command Tag selects at random a slot in which it will reply Set slot size Set the maximum number of slots Select a time lost TS(n) in which to reply in range of 1 to D Transmit its reply when it has waited for TS(n) * (Slot Size 1) Slot size = tag reply packet length + 2 ms Number of slots = (Window Size * 57.3 ms ) / slot size When the LP is finished, interrogator transmit a Sleep command If further data is be read from the tag, transmit Read Universal Data Block command During CP, interrogator senses that how many collisions occurred If too many, increase window size else decrease window size 11

CSD CSD (Conveyance Security Device) Security device which set up in container CSD standardization document CSD Requirement Document CSD-to-CSD Reader Interface Control Document CSD-to-DCP Interface Control Document SHHR Requirement Document DCP Requirement Document 12

CSD system Purpose Monitor for intrusion through the cargo loading doors Support shipping security from POA (Point of Arming) ITP (Intermediate Transit Points) TTP (Trip Termination Point) System component CSD SHHR CSD Reader Fixed Reader SHHR (Secured Hand-Held Reader) DCP (Data Consolidation Point) RF IP DCP Fixed Reader Figure 7. CSD system component 13

CSD system (cont d) CSD Purpose Monitor the security stats of the container door Functions Fixed Reader Compose IEEE 802.15.4b star topology with CSD reader Creates an event log of all relevant events Encryption / Decryption (AES128, HMAC-SHA256) After arming, save all data If deactivated state, don t save Functions Compose IEEE 802.15.4b star topology with CSD Communicate DCP via TCP/IP 14

CSD system (cont d) SHHR DCP Hand-held device Used by DHS authorized security agent Agent can unlimitedly access CSD data CSD command Data Consolidation Point Functions Exist web server Retain CSD information Management encryption key Communicate CSD Reader(Fixed, SHHR) via TCP/IP AES128, HMAC-SHA256 encryption/decryption 15

CSD system (cont d) Figure 8. CSD system data flow 16

Encryption Encryption key Vendor provides to DHS DHS mange keys at DCP SHHR download keys form DCP Each CSD have an unique encryption key Figure 9. CSD system encryption 17

CSD requirement Functional requirement CSD perform various functions upon valid commands Status sensing requirements CSD shall report the door status as either open or closed CSD shall monitor at least at a rate of 1 sample per second Power requirements CSD power source shall have sufficient power for the duration of a trip Figure 10. CSD state transition diagram 18

IEEE 802.15.4a IEEE 802.15.4 Framework for low data rate communications systems Typically sensor network ZigBee IEEE 802.15.4a Revision IEEE 802.15.4 New options for physical layer Higher data rate Accurate ranging capability New Physical layer features on MAC 19

Physical layer Based on two different technologies UWB (Ultra Wide Band) Chirp signals UWB signal 802.15.4a uses three frequency bands Sub-GHz band, low band in 3-5 GHz range high band in 6-10 GHz range Compliant device must support channel 0, 3, 9 for sub-ghz Characterized by bandwidth of about 500MHz Ranging with an accuracy in the order of 1 meter Figure 11. Channelization scheme in IEEE 802.16.4a 20

Physical layer (cont d) UWB physical layer Data bits are mapped on PPM (Pulse Position Modulation) Devices compliant to the standard PAM (Pulse Amplitude Modulation) Optional PPM vs. PPM & PAM UWB physical layer can achieve 0.1 Mb/s and 26 Mb/s Chirp signal Advantage of working in the 2.4 GHz ISM band 14 channels spaced of 5 MHz Frequency range between 2410 and 2486 MHz Can achieve at most 1 Mb/s 21

MAC sub-layer Inherits IEEE 802.15.4 strategy ALOHA Beacon-enabled Only when the PAN has a star topology Non-beacon-enabled Suited for PANs adopting the peer-to-peer topology But can be adopted in a start network Adopting a Time Hopping scheme Different delay on each burst in a packet Thus further reducing the probability of packet loss due to collisions CSMA-CA kept as options UWB - Address high-density, high-traffic scenarios Enable the use of the Chirp physical layer 22

Summary ISO/IEC 18000-7 CSD 433Mhz band used Tag arbitration mechanism CSD system IEEE 802.15.4a UWB, Chirp ALOHA 23

References Papers Luca De Nardis and Maria-Gabriella Di Benedetto, Overview of the IEEE 802.15.4/4a standards for low data rate Wireless Personal Data Networks, WPNC, Hannover, Germany, 2007, pp. 285-289 Manual ISO/IEC FDIS 18000-7, 2006 CONVEYANCE SECURITY DEVICE(CSD) REQUIREMENTS BASELINE VERSION 1.2, 2007 IEEE P802.15.4a/D7, 2007 Websites http://sdc.sejong.ac.kr/courses/board/data/200921_digit_comm/chapt er7_%ec%b5%9c%ec%a2%85.pdf 24