An Overview: iButton (1-Wire Technology) and ZigBee Wireless Protocol
R. W. Somkuwar1, P. L. Paikrao2, D. S. Chaudhari3
1Rohit W. Sokuwar, Department of Electronics and Telecommunication, Government College of Engineering, Amravati (Maharashtra), India.
2Prashant P. Paikrao, Department of Electronics and Telecommunication, Government College of Engineering, Amravati (Maharashtra), India.
3Dr. Devendra S. Chaudhari, Department of Electronics and Telecommunication, Government College of Engineering, Amravati (Maharashtra), India.
Manuscript received on 12 March 2013 | Revised Manuscript received on 21 March 2013 | Manuscript Published on 30 March 2013 | PP: 79-83 | Volume-2 Issue-4, March 2013 | Retrieval Number: D0529032413/13©BEIESP
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: Many wireless applications in the world require identification and authorisation of a device or a person for carrying information. Also there is a need of transmission schemes for transmitting such signals to the host computer over the network. In such applications different tools are used for authentication, that includes barcodes, magnetic stripes, chip cards, RF tags, iButton, etc. Similarly, different wireless technologies are available viz. Bluetooth, ZigBee, Wi-Fi, etc. A review of different applications based on ibutton and ZigBee used for accessing and data transmission schemes are discussed in this paper.
Keywords: Access Control, Anycast, Authentication, Data Logging, Fall Monitoring, Home Automation, Ibutton®, Interrogation, Zigbee, Zigbee Power Adapter (ZPA.
Scope of the Article: Network Protocols & Wireless Networks