Document Type : Review Paper


1 CSE, FSIT, Daffodil International University, Dhaka Bangladesh

2 Department of Computer Science and Engineering Jahangirnagar University, Savar, Dhaka-1342, Bangladesh.

3 Professor, Department of Electrical and Electronic Engineering, Daffodil International University, Dhaka, Bangladesh

4 Department of Computer Science and Engineering,Daffodil Institute of IT,Dhaka,Bangladesh

5 Professor , Department of Computer Science and Engineering, Daffodil International University, Dhaka, Bangladesh


A Detailed Exploration of usability statistics and Application Rating on short-range Wireless protocols Bluetooth (IEEE 802.15.1), ZigBee (IEEE 802.15.4), Wi-Fi (IEEE 802.11) and NFC (ISO/IEC 14443) has been performed that being representing of those prominent wireless protocols evaluating their main characteristics and performances in terms of some metric such as co-existence, data rate, security, power consumption, joining time are analyzed and presented. Furthermore, considering the file sharing, tag connection, payment method apply and security parameters, usability statistics, application rating and research output is also depicted so that one can easily identify the scope of the protocols, and can visualize the most trending and demandable wireless protocol. A deeply analyzed bar graph illustrates the most demandable wireless protocol . This can be applied in any user's work in the Wireless Network lab and also be implemented in any real-world applications for the appropriate components and devices among the protocols in proper fields.


Main Subjects

 1. Bhagwat, P.J.I.I.C., Bluetooth: technology for short-range wireless apps. 2001. 5(3): p. 96-103; Available from:
2. Kabir, A. and A.A. Khan, Comparison Among Short Range Wireless Network: Bluetooth, ZigBee and Wifi, in Computer Network. 2010, KTH(The Royal Institute of Technology). p. 42.
3. Gomez, C., J. Oller, and J.J.S. Paradells, Overview and evaluation of bluetooth low energy: An emerging low-power wireless technology. 2012. 12(9): p. 11734-11753; Available from:
4. Bisdikian, C.J.I.C.M., An overview of the Bluetooth wireless technology. 2001. 39(12): p. 86-94; Available from:
5. Park, W., Bluetooth Specification Version 3.0 + HS [Vol 0]. 2009.
6. Marquess, K.J.B.T.W.S.B.T.W.S.R.M., Bluetooth specification version 4.0 [vol 0]. 2012. 29.
7. Society, I.C. and L.M.S. Committee, Wireless Medium Access control (MAC) and physical Layer (PHY) Specifications for low Rate wireless personal Area Networks (WPANs). 2006; Available from:
8. Anonymous, The 802.11 protocol stack and physical layer. 2010; Available from:
9. Center, W. Point Coordination Function (PCF). 2007; Available from: http//
10. Terzis, A.J.I.J.o.S.N., Minimising the effect of WiFi interference in 802.15. 4 wireless sensor networks. 2007. 3(1): p. 43-54; Available from:
11. Thonet, G., et al., Zigbee-wifi coexistence. 2008. 1: p. 1-38; Available from:
12. Kurose, J. and K. Ross, Computer Networking: A Top Down Approach, 2012. 6 ed. 2012: Addison-Wesley.
13. Renardi, M.B., et al., Baggage Claim in Airports Using Near Field Communication. 2017. 7(2): p. 442-448; Available from:
15. Nashwan, S.J.I.J.o.C.S. and N. Security, Secure Authentication Protocol for NFC Mobile Payment Systems. 2017. 17(8): p. 256-262; Available from:
16. Badra, M. and R.B.J.P.C.S. Badra, A lightweight security protocol for NFC-based mobile payments. 2016. 83: p. 705-711; Available from:
17. El Madhoun, N. and G. Pujolle. Security enhancements in emv protocol for nfc mobile payment. in 2016 IEEE Trustcom/BigDataSE/ISPA. 2016. IEEE.
18. Tung, Y.-H., W.-S.J.J.o.e.s. Juang, and technology, Secure and efficient mutual authentication scheme for NFC mobile devices. 2017. 15(3): p. 240-245; Available from:
19. Lazaro, A., R. Villarino, and D.J.S. Girbau, A survey of NFC sensors based on energy harvesting for IoT applications. 2018. 18(11): p. 3746; Available from:
20. Nadzir, N.M., et al., Long-Range Monitoring System with PDMS Material. 2018. 10(3): p. 974-9; Available from:
21. Harnaningrum, L., NFC Communication Protocol. International Journal of Engineering and Computer Science, 2018. 7(9): p. 24197-24205; Available from:
22. Meybodi, M.R. and H. Beigy, A Two-Threshold Guard Channel Scheme for Minimizing Blocking Probability in Communication Networks. International Journal of Engineering, 2004. 17(3): p. 247-264; Available from:
23. Joseph, R., M. Rajappa, and D.J.I.J.o.E. David, Improving Bandwidth-power Efficiency of Homogeneous Wireless Networks Using On-meet Threshold Strategy (RESEARCH NOTE). 2014. 27(9): p. 1349-1358; Available from:
24. Pastor, S., et al., A Real-time Motion Tracking Wireless System for Upper Limb Exosuit Based on Inertial Measurement Units and Flex Sensors. 2019. 32(6): p. 820-827; Available from:
25. Taghizadeh, S.R., LEBRP - A Lightweight and Energy Balancing Routing Protocol for Energy-Constrained Wireless Ad Hoc Networks. International Journal of Engineering, 2014. 27(1): p. 33-38; Available from: