Applications of ZigBee Protocol in Security System: Literature Survey
Author(s): AL-RAWI, Muhanned
Author(s) keywords: applications, security system, Zigbee protocol
Reference keywords: communications, Internet of Things, Zigbee
Abstract:
Communication protocols are essential to enabling seamless connectivity in the vast world of the Internet of Things (IoT). The Zigbee Alliance created the Zigbee wireless communication standard, which uses IEEE 802.15. 4 radio frequency, with a focus on short-range, low-power data transfer. Zigbee is notable for its energy efficiency, scalability, and capacity to create robust mesh networks. It was created for use in sensor networks, industrial control, and home automation applications. Zigbee-enabled devices can easily communicate with one another to create networked systems that can self-heal and adapt. Zigbee has become well-known in the Internet of Things (IoT) ecosystem due to its emphasis on reducing power consumption and supporting a variety of devices. Because of its adaptability, it is a great option for smart home appliances, enabling dependable communication and advancing the development of intelligent, networked systems in a variety of sectors. This paper provides literature survey on the applications of Zigbee protocol in security system.
References:
[1]. A. Mishra, C. Na and D. Rosenburgh, "On Scheduling Guaranteed Time Slots for Time Sensitive Transactions in IEEE 802.15.4 Networks," MILCOM 2007 - IEEE Military Communications Conference, Orlando, FL, USA, 2007, pp. 1-7, doi: 10.1109/MILCOM.2007.4455149.
[2]. C. Liang, et.al., "Smart Home Security System Based on Zigbee", Advances in Smart System Technologies. Advances in Intelligent Systems and Computing, vol.1163. Springer, Singapore, 2021.
[3]. Chanthaphone Sisavath, and Lasheng Yu, "Design and implementation of security system for smart home based on IOT technology", Procedia Computer Science, Vo.183, pp. 4-13, 2021.
[4]. H. Khujamatov, et al., "Development of a security system based on Zigbee devices," 2022 International Conference on Information Science and Communications Technologies (ICISCT), Tashkent, Uzbekistan, 2022.
[5]. Y Dang, Y, et.al., "A Novel Home Safety IoT Monitoring Method Based on ZigBee Networking", Proceeding of 2021 International Conference on Wireless Communications, Networking and Applications. WCNA 2022.
[6]. A. Zohourian, et.al., "IoT Zigbee device security: A comprehensive review", Internet of Things, vol. 22, 2023.
[7]. Mengfei Ren, et al., "Security Analysis of Zigbee Protocol Implementation via Device-agnostic Fuzzing", Digital Threats: Research and Practice, vol.4, Issue 1, pp. 1 - 24, 2023.
[8]. G. Vlad, Ovidiu, et.al., "A Comprehensive Analysis: Evaluating Security Characteristics of Xbee Devices against Zigbee Protocol" Sensors vol. 23, no. 21, 2023.
[9]. A. Allakany, et al., "Enhancing Security in ZigBee Wireless Sensor Networks: A New Approach and Mutual Authentication Scheme for D2D Communication", Sensors, vol.23, no.12, 2023.
[10]. L. Rong, et al., "ZPA: A Smart Home Privacy Analysis System Based on ZigBee Encrypted Traffic", wireless Communications and Mobile Computing, vol.2023, Issue 1, 2023.
[11]. D. Yuhan, "Research on Security System of Smart Home Based on ZigBee", International Journal of Computer Science and Information Technology, vol.4, no.1, pp.37-45, 2024.
[12]. M. Kumar, et.al, "Advance comprehensive analysis for Zigbee network-based IoT system security", Discover Computing, vol 27, no 22, 2024.
[13]. H. Lv, et.al., "Design of Hybrid Topology Wireless Sensor Network Nodes Based on ZigBee Protocol", Electronics, vol.14, no 1, 2025.
[14]. L. Yulong, et.al., "Design of campus security management and control based on ZigBee", Fourth International Conference on Network Communication and Information Security, SPIE, 2025.
Article Title: Applications of ZigBee Protocol in Security System: Literature Survey
Author(s): AL-RAWI, Muhanned
Date of Publication: 2025-12-24
Publication: International Journal of Information Security and Cybercrime
ISSN: 2285-9225 e-ISSN: 2286-0096
Digital Object Identifier: 10.19107/IJISC.2025.02.02
Issue: Volume XIV, Issue 2, Year 2025
Section: Advances in Information Security Research
Page Range: 25-31 (7 pages)
Copyright ©2012-2026
The International Journal of Information Security and Cybercrime (IJISC)
All rights reserved
The International Journal of Information Security and Cybercrime is a trademark of the Romanian Association for Information Security Assurance (RAISA).
No part of this publication may be reproduced, stored in a retrieval system, photocopied, recorded or archived, without the written permission from RAISA. When authors submit their papers for publication, they agree that the copyright for their article be transferred to the Romanian Association for Information Security Assurance, if the articles are accepted for publication. The copyright covers the exclusive rights to reproduce and distribute the article, including reprints and translations.


---