Design and Implementation of Home Network Protocol for Appliance Control Based on IEEE 802.15.4

Summary Interest in a home network is increasing in accordance with enhancing functionalities of household-electric-appliances. A wireless communication standard, IEEE 802.15.4 attracts attention as a communication media of the home network. This paper proposes a network protocol based on IEEE 802.15.4, which is designed in consideration of requirements and features of the home network. This protocol provides appliance registration procedures by users’ simple operations. Moreover, authentication and encryption by using pre-shared secret information help to maintain network security. Experimental system has been implemented so as to confirm proper functions of the proposed protocol.

[1]  Jaap C. Haartsen,et al.  The Bluetooth radio system , 2000, IEEE Personal Communications.

[2]  Ieee Standards Board IEEE standards for local and metropolitan area networks : supplement to Carrier Sense Multiple Access with Collision Detection (CSMA/CD) access method and physical layer specifications : layer management (section 5) , 1991 .

[3]  Myung-Ki Shin,et al.  Transmission of IPv6 Packets over IEEE 802.16 , 2006 .

[4]  Dirk Fox,et al.  Advanced Encryption Standard (AES) , 1999, Datenschutz und Datensicherheit.

[5]  Edgar H. Callaway,et al.  Home networking with IEEE 802.15.4: a developing standard for low-rate wireless personal area networks , 2002, IEEE Commun. Mag..

[6]  Gabriel Montenegro,et al.  6LoWPAN: Overview, Assumptions, Problem Statement and Goals , 2005 .

[7]  Charles E. Perkins,et al.  Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.

[8]  A. M. Abdullah,et al.  Wireless lan medium access control (mac) and physical layer (phy) specifications , 1997 .

[9]  S. Teger,et al.  End-user perspectives on home networking , 2002 .

[10]  David E. Culler,et al.  Transmission of IPv6 Packets over IEEE 802.15.4 Networks , 2007, RFC.

[11]  尚弘 島影 National Institute of Standards and Technologyにおける超伝導研究及び生活 , 2001 .

[12]  Morris J. Dworkin,et al.  Recommendation for Block Cipher Modes of Operation: Methods and Techniques , 2001 .

[13]  Naganand Doraswamy,et al.  IP Security Document Roadmap , 1998, RFC.