Show simple item record

dc.contributor.authorRadmand, Pedram
dc.contributor.authorDomingo, M.
dc.contributor.authorSingh, Jaipal
dc.contributor.authorArnedo, J.
dc.contributor.authorTalevski, Alex
dc.contributor.authorPetersen, S.
dc.contributor.authorCarlsen, S.
dc.contributor.editorFatos Xhafa
dc.contributor.editorLeonard Barolli
dc.contributor.editorHiroaki Nishino
dc.contributor.editorMarkus Aleksy
dc.date.accessioned2017-01-30T11:23:30Z
dc.date.available2017-01-30T11:23:30Z
dc.date.created2011-03-15T20:01:41Z
dc.date.issued2010
dc.identifier.citationRadmand, P. and Domingo, M. and Singh, J. and Arnedo, J. and Talevski, A. and Petersen, S. and Carlsen, S. 2010. ZigBee/ZigBee PRO Security Assessment Based on Compromised Cryptographic Keys, in Xhafa, F. and Barolli, L. and Nishino, H. and Aleksy, M. (ed), 5th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC 2010), Nov 4 2010, pp. 465-470. Fukuoka, Japan: IEEE.
dc.identifier.urihttp://hdl.handle.net/20.500.11937/11224
dc.identifier.doi10.1109/3PGCIC.2010.79
dc.description.abstract

Sensor networks have many applications in monitoring and controlling of environmental properties such as sound, acceleration, vibration and temperature. Due to limited resources in computation capability, memory and energy, they are vulnerable to many kinds of attacks. The ZigBee specification, based on the 802.15.4 standard, defines a set of layers specifically suited to sensor networks. These layers support secure messaging using symmetric cryptographic. This paper presents two different ways for grabbing the cryptographic key in ZigBee: remote attack and physical attack. It also surveys and categorizes some additional attacks which can be performed on ZigBee networks: eavesdropping, spoofing, replay and DoS attacks at different layers. From this analysis, it is shown that some vulnerabilities still in the existing security schema in ZigBee technology.

dc.publisherIEEE Computer Society
dc.titleZigBee/ZigBee PRO Security Assessment Based on Compromised Cryptographic Keys
dc.typeConference Paper
dcterms.source.startPage465
dcterms.source.endPage470
dcterms.source.titleProceedings of the 5th international conference on P2P, parallel, grid, cloud and internet computing (3PGCIC 2010)
dcterms.source.seriesProceedings of the 5th international conference on P2P, parallel, grid, cloud and internet computing (3PGCIC 2010)
dcterms.source.isbn9781424485383
dcterms.source.conference5th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC 2010)
dcterms.source.conference-start-dateNov 4 2010
dcterms.source.conferencelocationFukuoka, Japan
dcterms.source.placeJapan
curtin.note

Copyright © 2010 IEEE This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.

curtin.departmentDigital Ecosystems and Business Intelligence Institute (DEBII)
curtin.accessStatusOpen access


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record