ZigBee/ZigBee PRO Security Assessment Based on Compromised Cryptographic Keys

Sensor networks have many applications in monitoring and controlling of environmental properties such as sound, acceleration, vibration and temperature. Due to limited resources in computation capability, memory and energy, they are vulnerable to many kinds of attacks. The ZigBee specification, base...

Full description

Bibliographic Details
Main Authors: Radmand, Pedram, Domingo, M., Singh, Jaipal, Arnedo, J., Talevski, Alex, Petersen, S., Carlsen, S.
Other Authors: Fatos Xhafa
Format: Conference Paper
Published: IEEE Computer Society 2010
Online Access:http://hdl.handle.net/20.500.11937/11224
_version_ 1848747748221779968
author Radmand, Pedram
Domingo, M.
Singh, Jaipal
Arnedo, J.
Talevski, Alex
Petersen, S.
Carlsen, S.
author2 Fatos Xhafa
author_facet Fatos Xhafa
Radmand, Pedram
Domingo, M.
Singh, Jaipal
Arnedo, J.
Talevski, Alex
Petersen, S.
Carlsen, S.
author_sort Radmand, Pedram
building Curtin Institutional Repository
collection Online Access
description Sensor networks have many applications in monitoring and controlling of environmental properties such as sound, acceleration, vibration and temperature. Due to limited resources in computation capability, memory and energy, they are vulnerable to many kinds of attacks. The ZigBee specification, based on the 802.15.4 standard, defines a set of layers specifically suited to sensor networks. These layers support secure messaging using symmetric cryptographic. This paper presents two different ways for grabbing the cryptographic key in ZigBee: remote attack and physical attack. It also surveys and categorizes some additional attacks which can be performed on ZigBee networks: eavesdropping, spoofing, replay and DoS attacks at different layers. From this analysis, it is shown that some vulnerabilities still in the existing security schema in ZigBee technology.
first_indexed 2025-11-14T06:54:04Z
format Conference Paper
id curtin-20.500.11937-11224
institution Curtin University Malaysia
institution_category Local University
last_indexed 2025-11-14T06:54:04Z
publishDate 2010
publisher IEEE Computer Society
recordtype eprints
repository_type Digital Repository
spelling curtin-20.500.11937-112242022-12-09T07:12:37Z ZigBee/ZigBee PRO Security Assessment Based on Compromised Cryptographic Keys Radmand, Pedram Domingo, M. Singh, Jaipal Arnedo, J. Talevski, Alex Petersen, S. Carlsen, S. Fatos Xhafa Leonard Barolli Hiroaki Nishino Markus Aleksy Sensor networks have many applications in monitoring and controlling of environmental properties such as sound, acceleration, vibration and temperature. Due to limited resources in computation capability, memory and energy, they are vulnerable to many kinds of attacks. The ZigBee specification, based on the 802.15.4 standard, defines a set of layers specifically suited to sensor networks. These layers support secure messaging using symmetric cryptographic. This paper presents two different ways for grabbing the cryptographic key in ZigBee: remote attack and physical attack. It also surveys and categorizes some additional attacks which can be performed on ZigBee networks: eavesdropping, spoofing, replay and DoS attacks at different layers. From this analysis, it is shown that some vulnerabilities still in the existing security schema in ZigBee technology. 2010 Conference Paper http://hdl.handle.net/20.500.11937/11224 10.1109/3PGCIC.2010.79 IEEE Computer Society fulltext
spellingShingle Radmand, Pedram
Domingo, M.
Singh, Jaipal
Arnedo, J.
Talevski, Alex
Petersen, S.
Carlsen, S.
ZigBee/ZigBee PRO Security Assessment Based on Compromised Cryptographic Keys
title ZigBee/ZigBee PRO Security Assessment Based on Compromised Cryptographic Keys
title_full ZigBee/ZigBee PRO Security Assessment Based on Compromised Cryptographic Keys
title_fullStr ZigBee/ZigBee PRO Security Assessment Based on Compromised Cryptographic Keys
title_full_unstemmed ZigBee/ZigBee PRO Security Assessment Based on Compromised Cryptographic Keys
title_short ZigBee/ZigBee PRO Security Assessment Based on Compromised Cryptographic Keys
title_sort zigbee/zigbee pro security assessment based on compromised cryptographic keys
url http://hdl.handle.net/20.500.11937/11224