ZigBee/ZigBee PRO Security Assessment Based on Compromised Cryptographic Keys
Sensor networks have many applications in monitoring and controlling of environmental properties such as sound, acceleration, vibration and temperature. Due to limited resources in computation capability, memory and energy, they are vulnerable to many kinds of attacks. The ZigBee specification, base...
| Main Authors: | , , , , , , |
|---|---|
| Other Authors: | |
| Format: | Conference Paper |
| Published: |
IEEE Computer Society
2010
|
| Online Access: | http://hdl.handle.net/20.500.11937/11224 |
| _version_ | 1848747748221779968 |
|---|---|
| author | Radmand, Pedram Domingo, M. Singh, Jaipal Arnedo, J. Talevski, Alex Petersen, S. Carlsen, S. |
| author2 | Fatos Xhafa |
| author_facet | Fatos Xhafa Radmand, Pedram Domingo, M. Singh, Jaipal Arnedo, J. Talevski, Alex Petersen, S. Carlsen, S. |
| author_sort | Radmand, Pedram |
| building | Curtin Institutional Repository |
| collection | Online Access |
| description | Sensor networks have many applications in monitoring and controlling of environmental properties such as sound, acceleration, vibration and temperature. Due to limited resources in computation capability, memory and energy, they are vulnerable to many kinds of attacks. The ZigBee specification, based on the 802.15.4 standard, defines a set of layers specifically suited to sensor networks. These layers support secure messaging using symmetric cryptographic. This paper presents two different ways for grabbing the cryptographic key in ZigBee: remote attack and physical attack. It also surveys and categorizes some additional attacks which can be performed on ZigBee networks: eavesdropping, spoofing, replay and DoS attacks at different layers. From this analysis, it is shown that some vulnerabilities still in the existing security schema in ZigBee technology. |
| first_indexed | 2025-11-14T06:54:04Z |
| format | Conference Paper |
| id | curtin-20.500.11937-11224 |
| institution | Curtin University Malaysia |
| institution_category | Local University |
| last_indexed | 2025-11-14T06:54:04Z |
| publishDate | 2010 |
| publisher | IEEE Computer Society |
| recordtype | eprints |
| repository_type | Digital Repository |
| spelling | curtin-20.500.11937-112242022-12-09T07:12:37Z ZigBee/ZigBee PRO Security Assessment Based on Compromised Cryptographic Keys Radmand, Pedram Domingo, M. Singh, Jaipal Arnedo, J. Talevski, Alex Petersen, S. Carlsen, S. Fatos Xhafa Leonard Barolli Hiroaki Nishino Markus Aleksy Sensor networks have many applications in monitoring and controlling of environmental properties such as sound, acceleration, vibration and temperature. Due to limited resources in computation capability, memory and energy, they are vulnerable to many kinds of attacks. The ZigBee specification, based on the 802.15.4 standard, defines a set of layers specifically suited to sensor networks. These layers support secure messaging using symmetric cryptographic. This paper presents two different ways for grabbing the cryptographic key in ZigBee: remote attack and physical attack. It also surveys and categorizes some additional attacks which can be performed on ZigBee networks: eavesdropping, spoofing, replay and DoS attacks at different layers. From this analysis, it is shown that some vulnerabilities still in the existing security schema in ZigBee technology. 2010 Conference Paper http://hdl.handle.net/20.500.11937/11224 10.1109/3PGCIC.2010.79 IEEE Computer Society fulltext |
| spellingShingle | Radmand, Pedram Domingo, M. Singh, Jaipal Arnedo, J. Talevski, Alex Petersen, S. Carlsen, S. ZigBee/ZigBee PRO Security Assessment Based on Compromised Cryptographic Keys |
| title | ZigBee/ZigBee PRO Security Assessment Based on Compromised Cryptographic Keys |
| title_full | ZigBee/ZigBee PRO Security Assessment Based on Compromised Cryptographic Keys |
| title_fullStr | ZigBee/ZigBee PRO Security Assessment Based on Compromised Cryptographic Keys |
| title_full_unstemmed | ZigBee/ZigBee PRO Security Assessment Based on Compromised Cryptographic Keys |
| title_short | ZigBee/ZigBee PRO Security Assessment Based on Compromised Cryptographic Keys |
| title_sort | zigbee/zigbee pro security assessment based on compromised cryptographic keys |
| url | http://hdl.handle.net/20.500.11937/11224 |