ZigBee/ZigBee PRO Security Assessment Based on Compromised Cryptographic Keys
Access Status
Authors
Date
2010Type
Metadata
Show full item recordCitation
Source Title
Source Conference
ISBN
School
Remarks
Copyright © 2010 IEEE This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.
Collection
Abstract
Sensor networks have many applications in monitoring and controlling of environmental properties such as sound, acceleration, vibration and temperature. Due to limited resources in computation capability, memory and energy, they are vulnerable to many kinds of attacks. The ZigBee specification, based on the 802.15.4 standard, defines a set of layers specifically suited to sensor networks. These layers support secure messaging using symmetric cryptographic. This paper presents two different ways for grabbing the cryptographic key in ZigBee: remote attack and physical attack. It also surveys and categorizes some additional attacks which can be performed on ZigBee networks: eavesdropping, spoofing, replay and DoS attacks at different layers. From this analysis, it is shown that some vulnerabilities still in the existing security schema in ZigBee technology.
Related items
Showing items related by title, author, creator and subject.
-
Radmand, Pedram (2012)This thesis develops an architectural framework to enhance the security of Wireless Sensor Networks (WSNs) and provides the implementation proof through different security countermeasures, which can be used to establish ...
-
Moridi, Mohammad; Kawamura, Youhei; Sharifzadeh, Mostafa; Chanda, E.; Jang, Hyongdoo (2014)In the challenging environment and changing topology of a mine, reliable and effective communication is a high-stake issue along with the objectives of safe and efficient mining operations. Automation by remote and automatic ...
-
Kawamura, Youhei; Moridi, Mohammad; Sharifzadeh, Mostafa; Jang, H. (2014)Data transfer and communication systems are first priority for further development of geotechnical monitoring. This paper describes a Wireless Sensor Network (WSN) for communication and monitoring systems based on ZigBee ...