DocumentCode :
3585943
Title :
Three practical attacks against ZigBee security: Attack scenario definitions, practical experiments, countermeasures, and lessons learned
Author :
Olawumi, Olayemi ; Haataja, Keijo ; Asikainen, Mikko ; Vidgren, Niko ; Toivanen, Pekka
Author_Institution :
Sch. of Comput., Univ. of Eastern Finland, Kuopio, Finland
fYear :
2014
Firstpage :
199
Lastpage :
206
Abstract :
In this paper, three practical attacks against ZigBee security are carried out in our laboratory environment. The attack scenarios are based on utilizing several vulnerabilities found from the main security components of ZigBee technology. The first attack is based on discovering all ZigBee-enabled networks within range as well as the configurations of the corresponding ZigBee-enabled devices: This vital and fundamental basic information can be used for performing further and more severe attacks against the discovered ZigBee-enabled devices/networks. The second attack can be seen as an extension to the first attack and thus the prerequisite for it is the successful completion of the first attack. In the second attack, an attacker eavesdrops on the unencrypted or encrypted traffic of a ZigBee-enabled network in order to obtain and utilize any sensitive/useful information. The third attack is based on replaying (re-transmitting) the captured data as if the original sender is sending the data again. To keep this attack extremely simple, straightforward, and practical, we decided to devise and implement it without having a Man-In-The-Middle (MITM) between the victim devices, since the presence of the MITM would have made the attack very difficult to implement in practice, thus giving it only a theoretical relevance. Indeed, we demonstrate with experimental figures that attacks against ZigBee-enabled devices become practical by using our three attack scenarios. In addition, countermeasures that render the attacks impractical, although not totally eliminating their potential danger, are devised. Moreover, some new ideas that will be used in our future research work are proposed.
Keywords :
Zigbee; computer network security; cryptography; telecommunication traffic; MITM; WPAN; ZigBee security; ZigBee-enabled devices; ZigBee-enabled networks; attack scenario definition; man-in-the-middle; unencrypted traffic; wireless security; Batteries; Hardware; Microprogramming; Security; Software; Universal Serial Bus; Zigbee; AES-CCM; KillerBee; WPAN; Wireless Security; ZigBee;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Hybrid Intelligent Systems (HIS), 2014 14th International Conference on
Print_ISBN :
978-1-4799-7632-4
Type :
conf
DOI :
10.1109/HIS.2014.7086198
Filename :
7086198
Link To Document :
بازگشت