Zigbee End Device

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 72 Experts worldwide ranked by ideXlab platform

Pekka Toivanen - One of the best experts on this subject based on the ideXlab platform.

  • HICSS - Security Threats in Zigbee-Enabled Systems: Vulnerability Evaluation, Practical Experiments, Countermeasures, and Lessons Learned
    2013 46th Hawaii International Conference on System Sciences, 2013
    Co-Authors: Niko Vidgren, Keijo Haataja, José Luis Patiño-andres, Juan José Ramírez-sanchis, Pekka Toivanen
    Abstract:

    In this paper, two practical attacks against Zigbee security are proposed and the latter one is also carried out in our laboratory environment. The attack scenarios are based on utilizing several vulnerabilities found from the main security components of Zigbee technology. The first attack is based on sabotaging the Zigbee End-Device by sEnding a special signal that makes it wake-up constantly until the battery runs out. The second attack is based on exploiting the key exchange process in Zigbee when using the Standard Security level defined by the Zigbee specification: we also demonstrate with experimental figures that attacks against Zigbee-enabled Devices become practical by using our attack scenario. In addition, countermeasures that rEnder the proposed attacks impractical, although not totally eliminating their potential danger, are devised. Moreover, some new ideas that will be used in our future research work are proposed.

  • Security Threats in Zigbee-Enabled Systems: Vulnerability Evaluation, Practical Experiments, Countermeasures, and Lessons Learned
    2013 46th Hawaii International Conference on System Sciences, 2013
    Co-Authors: Niko Vidgren, Keijo Haataja, José Luis Patiño-andres, Juan José Ramírez-sanchis, Pekka Toivanen
    Abstract:

    In this paper, two practical attacks against Zigbee security are proposed and the latter one is also carried out in our laboratory environment. The attack scenarios are based on utilizing several vulnerabilities found from the main security components of Zigbee technology. The first attack is based on sabotaging the Zigbee End-Device by sEnding a special signal that makes it wake-up constantly until the battery runs out. The second attack is based on exploiting the key exchange process in Zigbee when using the Standard Security level defined by the Zigbee specification: we also demonstrate with experimental figures that attacks against Zigbee-enabled Devices become practical by using our attack scenario. In addition, countermeasures that rEnder the proposed attacks impractical, although not totally eliminating their potential danger, are devised. Moreover, some new ideas that will be used in our future research work are proposed.

Niko Vidgren - One of the best experts on this subject based on the ideXlab platform.

  • HICSS - Security Threats in Zigbee-Enabled Systems: Vulnerability Evaluation, Practical Experiments, Countermeasures, and Lessons Learned
    2013 46th Hawaii International Conference on System Sciences, 2013
    Co-Authors: Niko Vidgren, Keijo Haataja, José Luis Patiño-andres, Juan José Ramírez-sanchis, Pekka Toivanen
    Abstract:

    In this paper, two practical attacks against Zigbee security are proposed and the latter one is also carried out in our laboratory environment. The attack scenarios are based on utilizing several vulnerabilities found from the main security components of Zigbee technology. The first attack is based on sabotaging the Zigbee End-Device by sEnding a special signal that makes it wake-up constantly until the battery runs out. The second attack is based on exploiting the key exchange process in Zigbee when using the Standard Security level defined by the Zigbee specification: we also demonstrate with experimental figures that attacks against Zigbee-enabled Devices become practical by using our attack scenario. In addition, countermeasures that rEnder the proposed attacks impractical, although not totally eliminating their potential danger, are devised. Moreover, some new ideas that will be used in our future research work are proposed.

  • Security Threats in Zigbee-Enabled Systems: Vulnerability Evaluation, Practical Experiments, Countermeasures, and Lessons Learned
    2013 46th Hawaii International Conference on System Sciences, 2013
    Co-Authors: Niko Vidgren, Keijo Haataja, José Luis Patiño-andres, Juan José Ramírez-sanchis, Pekka Toivanen
    Abstract:

    In this paper, two practical attacks against Zigbee security are proposed and the latter one is also carried out in our laboratory environment. The attack scenarios are based on utilizing several vulnerabilities found from the main security components of Zigbee technology. The first attack is based on sabotaging the Zigbee End-Device by sEnding a special signal that makes it wake-up constantly until the battery runs out. The second attack is based on exploiting the key exchange process in Zigbee when using the Standard Security level defined by the Zigbee specification: we also demonstrate with experimental figures that attacks against Zigbee-enabled Devices become practical by using our attack scenario. In addition, countermeasures that rEnder the proposed attacks impractical, although not totally eliminating their potential danger, are devised. Moreover, some new ideas that will be used in our future research work are proposed.

Keijo Haataja - One of the best experts on this subject based on the ideXlab platform.

  • HICSS - Security Threats in Zigbee-Enabled Systems: Vulnerability Evaluation, Practical Experiments, Countermeasures, and Lessons Learned
    2013 46th Hawaii International Conference on System Sciences, 2013
    Co-Authors: Niko Vidgren, Keijo Haataja, José Luis Patiño-andres, Juan José Ramírez-sanchis, Pekka Toivanen
    Abstract:

    In this paper, two practical attacks against Zigbee security are proposed and the latter one is also carried out in our laboratory environment. The attack scenarios are based on utilizing several vulnerabilities found from the main security components of Zigbee technology. The first attack is based on sabotaging the Zigbee End-Device by sEnding a special signal that makes it wake-up constantly until the battery runs out. The second attack is based on exploiting the key exchange process in Zigbee when using the Standard Security level defined by the Zigbee specification: we also demonstrate with experimental figures that attacks against Zigbee-enabled Devices become practical by using our attack scenario. In addition, countermeasures that rEnder the proposed attacks impractical, although not totally eliminating their potential danger, are devised. Moreover, some new ideas that will be used in our future research work are proposed.

  • Security Threats in Zigbee-Enabled Systems: Vulnerability Evaluation, Practical Experiments, Countermeasures, and Lessons Learned
    2013 46th Hawaii International Conference on System Sciences, 2013
    Co-Authors: Niko Vidgren, Keijo Haataja, José Luis Patiño-andres, Juan José Ramírez-sanchis, Pekka Toivanen
    Abstract:

    In this paper, two practical attacks against Zigbee security are proposed and the latter one is also carried out in our laboratory environment. The attack scenarios are based on utilizing several vulnerabilities found from the main security components of Zigbee technology. The first attack is based on sabotaging the Zigbee End-Device by sEnding a special signal that makes it wake-up constantly until the battery runs out. The second attack is based on exploiting the key exchange process in Zigbee when using the Standard Security level defined by the Zigbee specification: we also demonstrate with experimental figures that attacks against Zigbee-enabled Devices become practical by using our attack scenario. In addition, countermeasures that rEnder the proposed attacks impractical, although not totally eliminating their potential danger, are devised. Moreover, some new ideas that will be used in our future research work are proposed.

José Luis Patiño-andres - One of the best experts on this subject based on the ideXlab platform.

  • HICSS - Security Threats in Zigbee-Enabled Systems: Vulnerability Evaluation, Practical Experiments, Countermeasures, and Lessons Learned
    2013 46th Hawaii International Conference on System Sciences, 2013
    Co-Authors: Niko Vidgren, Keijo Haataja, José Luis Patiño-andres, Juan José Ramírez-sanchis, Pekka Toivanen
    Abstract:

    In this paper, two practical attacks against Zigbee security are proposed and the latter one is also carried out in our laboratory environment. The attack scenarios are based on utilizing several vulnerabilities found from the main security components of Zigbee technology. The first attack is based on sabotaging the Zigbee End-Device by sEnding a special signal that makes it wake-up constantly until the battery runs out. The second attack is based on exploiting the key exchange process in Zigbee when using the Standard Security level defined by the Zigbee specification: we also demonstrate with experimental figures that attacks against Zigbee-enabled Devices become practical by using our attack scenario. In addition, countermeasures that rEnder the proposed attacks impractical, although not totally eliminating their potential danger, are devised. Moreover, some new ideas that will be used in our future research work are proposed.

  • Security Threats in Zigbee-Enabled Systems: Vulnerability Evaluation, Practical Experiments, Countermeasures, and Lessons Learned
    2013 46th Hawaii International Conference on System Sciences, 2013
    Co-Authors: Niko Vidgren, Keijo Haataja, José Luis Patiño-andres, Juan José Ramírez-sanchis, Pekka Toivanen
    Abstract:

    In this paper, two practical attacks against Zigbee security are proposed and the latter one is also carried out in our laboratory environment. The attack scenarios are based on utilizing several vulnerabilities found from the main security components of Zigbee technology. The first attack is based on sabotaging the Zigbee End-Device by sEnding a special signal that makes it wake-up constantly until the battery runs out. The second attack is based on exploiting the key exchange process in Zigbee when using the Standard Security level defined by the Zigbee specification: we also demonstrate with experimental figures that attacks against Zigbee-enabled Devices become practical by using our attack scenario. In addition, countermeasures that rEnder the proposed attacks impractical, although not totally eliminating their potential danger, are devised. Moreover, some new ideas that will be used in our future research work are proposed.

Juan José Ramírez-sanchis - One of the best experts on this subject based on the ideXlab platform.

  • HICSS - Security Threats in Zigbee-Enabled Systems: Vulnerability Evaluation, Practical Experiments, Countermeasures, and Lessons Learned
    2013 46th Hawaii International Conference on System Sciences, 2013
    Co-Authors: Niko Vidgren, Keijo Haataja, José Luis Patiño-andres, Juan José Ramírez-sanchis, Pekka Toivanen
    Abstract:

    In this paper, two practical attacks against Zigbee security are proposed and the latter one is also carried out in our laboratory environment. The attack scenarios are based on utilizing several vulnerabilities found from the main security components of Zigbee technology. The first attack is based on sabotaging the Zigbee End-Device by sEnding a special signal that makes it wake-up constantly until the battery runs out. The second attack is based on exploiting the key exchange process in Zigbee when using the Standard Security level defined by the Zigbee specification: we also demonstrate with experimental figures that attacks against Zigbee-enabled Devices become practical by using our attack scenario. In addition, countermeasures that rEnder the proposed attacks impractical, although not totally eliminating their potential danger, are devised. Moreover, some new ideas that will be used in our future research work are proposed.

  • Security Threats in Zigbee-Enabled Systems: Vulnerability Evaluation, Practical Experiments, Countermeasures, and Lessons Learned
    2013 46th Hawaii International Conference on System Sciences, 2013
    Co-Authors: Niko Vidgren, Keijo Haataja, José Luis Patiño-andres, Juan José Ramírez-sanchis, Pekka Toivanen
    Abstract:

    In this paper, two practical attacks against Zigbee security are proposed and the latter one is also carried out in our laboratory environment. The attack scenarios are based on utilizing several vulnerabilities found from the main security components of Zigbee technology. The first attack is based on sabotaging the Zigbee End-Device by sEnding a special signal that makes it wake-up constantly until the battery runs out. The second attack is based on exploiting the key exchange process in Zigbee when using the Standard Security level defined by the Zigbee specification: we also demonstrate with experimental figures that attacks against Zigbee-enabled Devices become practical by using our attack scenario. In addition, countermeasures that rEnder the proposed attacks impractical, although not totally eliminating their potential danger, are devised. Moreover, some new ideas that will be used in our future research work are proposed.