Design challenges for short-range wireless networks

Design challenges for short-range wireless networks

For access to this article, please select a purchase option:

Buy article PDF
(plus tax if applicable)
Buy Knowledge Pack
10 articles for $120.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend Title Publication to library

You must fill out fields marked with: *

Librarian details
Your details
Why are you recommending this title?
Select reason:
IEE Proceedings - Communications — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

The proliferation of mobile computing devices including laptops, personal digital assistants (PDAs) and wearable computers has created an enormous demand for wireless personal area networks (WPANs). WPANs originally enabled convenient interconnection of devices around an individual person or computer. From this starting point, a broad variety of new wireless appliances has been developed, allowing proximal devices to share information and resources. Major fields of application are industrial, scientific and medical (ISM), but also consumer electronics and smart home appliances. However, for this short-range wireless connectivity, some additional challenges must be resolved. They are: (i) topology issues, i.e. self-organising, ad hoc and mesh networking; (ii) device issues, i.e. efficient, modular, low-cost and power-saving implementation; and (iii) security issues. The paper gives an overview of the challenges and suggests different solutions, especially in the field of security. In addition, it reports on working experience with two protocols: Bluetooth and IEEE802.15.4.


    1. 1)
    2. 2)
    3. 3)
      • Mackensen, E., Kuntz, W., Müller, C.: `Smart wireless autonomous microsystems (SWAMs) for sensor actuator networks', Presented at SIcon 2004 Conf., January 2004, New Orleans, USA.
    4. 4)
    5. 5)
    6. 6)
      • E.W. Dijkstra . A note on two problems in connection with graphs. Numer. Math. , 269 - 271
    7. 7)
      • Bilstrup, U., Sjöberg, K., Svensson, B., Wiberg, P.-A.: `Capacity limitations in wireless sensor networks', Proc. IEEE Conf. on Emerging Technologies and Factory Automation, 2003, Lisbon, Portugal, p. 529–536.
    8. 8)
    9. 9)
      • A. Sikora , R. Drechsler . (2002) Software-engineering and hardware-design.
    10. 10)
      • C. Eckert . (2003) IT-Sicherheit.
    11. 11)
    12. 12)
      • A. Sikora . (2003) Wireless personal and local area networks.
    13. 13)
      • Borisov, N., Goldberg, I., and Wagner, D.: ‘Security of the WEP algorithm’. Available at:
    14. 14)
      • Wi-Fi Protected Access, available at:
    15. 15)
      • Ascom, ‘WAKAN crypto software toolkit’. Information available at and at
    16. 16)
      • Sikora, A.: ‘Implementing DES/3DES with Atmel FPSLIC’, Atmel Application Note, to be published.
    17. 17)
      • J. Wollert . Bluetooth-Sicherheit. Elektron. Wirel. , 30 - 35
    18. 18)
      • HomeRF™ Technical Committee, ‘HomeRF Specification, HomeRF, Revision 2.01’. available at:
    19. 19)
      • A. Sikora . ZigBee: Grundlagen und Applikationen. Elektron. Wirel. , 18 - 24
    20. 20)
      • User guide MC13192DVKUG/D Rev. 0.2, 09/2003, IEEE 802.15.4 evaluation kit (Motorola, 2003)..

Related content

This is a required field
Please enter a valid email address