Search results for "zigbee"
showing 3 items of 13 documents
An Inter-Technology Communication Scheme for WiFi/ZigBee Coexisting Networks
2017
In this paper we show how inter-technology interference can be exploited to set-up a low-rate bi-directional communication channel between heterogeneous technologies, which coexist in ISM bands. In particular, we focus on WiFi and ZigBee networks, whose high density deployments make coexistence a critical issue. We monitor the transmission duration of the interference and, after recognizing ZigBee interference from WiFi off-the-shelf receivers, we precisely measure the channel busy intervals to map time duration to communication symbols. A similar approach is used on the ZigBee receivers for making the communication channel bidirectional. Extensive experimental results show the feasibility …
BusyBee: Low Rate WiFi-ZigBee Communications without Gateways
2014
Nowadays, the overcrowding of ISM bands is becoming an evident limitation for the performance and widespread us- age of 802.11 and 802.15.4 technologies. In this demo, we prove that it is possible to opportunistically exploit the inter- technology interference between 802.11 and 802.15.4 to build an unconventional low-rate communication channel and sig- nalling protocol, devised to improve the performance of each contending technology. Differently from previous solutions, inter-technology communications do not require the deploy- ment of a gateway with two network interfaces, but can be activated (when needed) directly between two heterogeneous nodes, e.g. a WiFi node and a ZigBee node. Thi…
Insecure Firmware and Wireless Technologies as “Achilles’ Heel” in Cybersecurity of Cyber-Physical Systems
2022
In this chapter, we analyze cybersecurity weaknesses in three use-cases of real-world cyber-physical systems: transportation (aviation), remote explosives and robotic weapons (fireworks pyrotechnics), and physical security (CCTV). The digitalization, interconnection, and IoT-nature of cyber-physical systems make them attractive targets. It is crucial to ensure that such systems are protected from cyber attacks, and therefore it is equally important to study and understand their major weaknesses. peerReviewed