The Experts below are selected from a list of 72 Experts worldwide ranked by ideXlab platform
Pekka Toivanen - One of the best experts on this subject based on the ideXlab platform.
-
HICSS - Security Threats in Zigbee-Enabled Systems: Vulnerability Evaluation, Practical Experiments, Countermeasures, and Lessons Learned
2013 46th Hawaii International Conference on System Sciences, 2013Co-Authors: Niko Vidgren, Keijo Haataja, José Luis Patiño-andres, Juan José Ramírez-sanchis, Pekka ToivanenAbstract:In this paper, two practical attacks against Zigbee security are proposed and the latter one is also carried out in our laboratory environment. The attack scenarios are based on utilizing several vulnerabilities found from the main security components of Zigbee technology. The first attack is based on sabotaging the Zigbee End-Device by sEnding a special signal that makes it wake-up constantly until the battery runs out. The second attack is based on exploiting the key exchange process in Zigbee when using the Standard Security level defined by the Zigbee specification: we also demonstrate with experimental figures that attacks against Zigbee-enabled Devices become practical by using our attack scenario. In addition, countermeasures that rEnder the proposed attacks impractical, although not totally eliminating their potential danger, are devised. Moreover, some new ideas that will be used in our future research work are proposed.
-
Security Threats in Zigbee-Enabled Systems: Vulnerability Evaluation, Practical Experiments, Countermeasures, and Lessons Learned
2013 46th Hawaii International Conference on System Sciences, 2013Co-Authors: Niko Vidgren, Keijo Haataja, José Luis Patiño-andres, Juan José Ramírez-sanchis, Pekka ToivanenAbstract:In this paper, two practical attacks against Zigbee security are proposed and the latter one is also carried out in our laboratory environment. The attack scenarios are based on utilizing several vulnerabilities found from the main security components of Zigbee technology. The first attack is based on sabotaging the Zigbee End-Device by sEnding a special signal that makes it wake-up constantly until the battery runs out. The second attack is based on exploiting the key exchange process in Zigbee when using the Standard Security level defined by the Zigbee specification: we also demonstrate with experimental figures that attacks against Zigbee-enabled Devices become practical by using our attack scenario. In addition, countermeasures that rEnder the proposed attacks impractical, although not totally eliminating their potential danger, are devised. Moreover, some new ideas that will be used in our future research work are proposed.
Niko Vidgren - One of the best experts on this subject based on the ideXlab platform.
-
HICSS - Security Threats in Zigbee-Enabled Systems: Vulnerability Evaluation, Practical Experiments, Countermeasures, and Lessons Learned
2013 46th Hawaii International Conference on System Sciences, 2013Co-Authors: Niko Vidgren, Keijo Haataja, José Luis Patiño-andres, Juan José Ramírez-sanchis, Pekka ToivanenAbstract:In this paper, two practical attacks against Zigbee security are proposed and the latter one is also carried out in our laboratory environment. The attack scenarios are based on utilizing several vulnerabilities found from the main security components of Zigbee technology. The first attack is based on sabotaging the Zigbee End-Device by sEnding a special signal that makes it wake-up constantly until the battery runs out. The second attack is based on exploiting the key exchange process in Zigbee when using the Standard Security level defined by the Zigbee specification: we also demonstrate with experimental figures that attacks against Zigbee-enabled Devices become practical by using our attack scenario. In addition, countermeasures that rEnder the proposed attacks impractical, although not totally eliminating their potential danger, are devised. Moreover, some new ideas that will be used in our future research work are proposed.
-
Security Threats in Zigbee-Enabled Systems: Vulnerability Evaluation, Practical Experiments, Countermeasures, and Lessons Learned
2013 46th Hawaii International Conference on System Sciences, 2013Co-Authors: Niko Vidgren, Keijo Haataja, José Luis Patiño-andres, Juan José Ramírez-sanchis, Pekka ToivanenAbstract:In this paper, two practical attacks against Zigbee security are proposed and the latter one is also carried out in our laboratory environment. The attack scenarios are based on utilizing several vulnerabilities found from the main security components of Zigbee technology. The first attack is based on sabotaging the Zigbee End-Device by sEnding a special signal that makes it wake-up constantly until the battery runs out. The second attack is based on exploiting the key exchange process in Zigbee when using the Standard Security level defined by the Zigbee specification: we also demonstrate with experimental figures that attacks against Zigbee-enabled Devices become practical by using our attack scenario. In addition, countermeasures that rEnder the proposed attacks impractical, although not totally eliminating their potential danger, are devised. Moreover, some new ideas that will be used in our future research work are proposed.
Keijo Haataja - One of the best experts on this subject based on the ideXlab platform.
-
HICSS - Security Threats in Zigbee-Enabled Systems: Vulnerability Evaluation, Practical Experiments, Countermeasures, and Lessons Learned
2013 46th Hawaii International Conference on System Sciences, 2013Co-Authors: Niko Vidgren, Keijo Haataja, José Luis Patiño-andres, Juan José Ramírez-sanchis, Pekka ToivanenAbstract:In this paper, two practical attacks against Zigbee security are proposed and the latter one is also carried out in our laboratory environment. The attack scenarios are based on utilizing several vulnerabilities found from the main security components of Zigbee technology. The first attack is based on sabotaging the Zigbee End-Device by sEnding a special signal that makes it wake-up constantly until the battery runs out. The second attack is based on exploiting the key exchange process in Zigbee when using the Standard Security level defined by the Zigbee specification: we also demonstrate with experimental figures that attacks against Zigbee-enabled Devices become practical by using our attack scenario. In addition, countermeasures that rEnder the proposed attacks impractical, although not totally eliminating their potential danger, are devised. Moreover, some new ideas that will be used in our future research work are proposed.
-
Security Threats in Zigbee-Enabled Systems: Vulnerability Evaluation, Practical Experiments, Countermeasures, and Lessons Learned
2013 46th Hawaii International Conference on System Sciences, 2013Co-Authors: Niko Vidgren, Keijo Haataja, José Luis Patiño-andres, Juan José Ramírez-sanchis, Pekka ToivanenAbstract:In this paper, two practical attacks against Zigbee security are proposed and the latter one is also carried out in our laboratory environment. The attack scenarios are based on utilizing several vulnerabilities found from the main security components of Zigbee technology. The first attack is based on sabotaging the Zigbee End-Device by sEnding a special signal that makes it wake-up constantly until the battery runs out. The second attack is based on exploiting the key exchange process in Zigbee when using the Standard Security level defined by the Zigbee specification: we also demonstrate with experimental figures that attacks against Zigbee-enabled Devices become practical by using our attack scenario. In addition, countermeasures that rEnder the proposed attacks impractical, although not totally eliminating their potential danger, are devised. Moreover, some new ideas that will be used in our future research work are proposed.
José Luis Patiño-andres - One of the best experts on this subject based on the ideXlab platform.
-
HICSS - Security Threats in Zigbee-Enabled Systems: Vulnerability Evaluation, Practical Experiments, Countermeasures, and Lessons Learned
2013 46th Hawaii International Conference on System Sciences, 2013Co-Authors: Niko Vidgren, Keijo Haataja, José Luis Patiño-andres, Juan José Ramírez-sanchis, Pekka ToivanenAbstract:In this paper, two practical attacks against Zigbee security are proposed and the latter one is also carried out in our laboratory environment. The attack scenarios are based on utilizing several vulnerabilities found from the main security components of Zigbee technology. The first attack is based on sabotaging the Zigbee End-Device by sEnding a special signal that makes it wake-up constantly until the battery runs out. The second attack is based on exploiting the key exchange process in Zigbee when using the Standard Security level defined by the Zigbee specification: we also demonstrate with experimental figures that attacks against Zigbee-enabled Devices become practical by using our attack scenario. In addition, countermeasures that rEnder the proposed attacks impractical, although not totally eliminating their potential danger, are devised. Moreover, some new ideas that will be used in our future research work are proposed.
-
Security Threats in Zigbee-Enabled Systems: Vulnerability Evaluation, Practical Experiments, Countermeasures, and Lessons Learned
2013 46th Hawaii International Conference on System Sciences, 2013Co-Authors: Niko Vidgren, Keijo Haataja, José Luis Patiño-andres, Juan José Ramírez-sanchis, Pekka ToivanenAbstract:In this paper, two practical attacks against Zigbee security are proposed and the latter one is also carried out in our laboratory environment. The attack scenarios are based on utilizing several vulnerabilities found from the main security components of Zigbee technology. The first attack is based on sabotaging the Zigbee End-Device by sEnding a special signal that makes it wake-up constantly until the battery runs out. The second attack is based on exploiting the key exchange process in Zigbee when using the Standard Security level defined by the Zigbee specification: we also demonstrate with experimental figures that attacks against Zigbee-enabled Devices become practical by using our attack scenario. In addition, countermeasures that rEnder the proposed attacks impractical, although not totally eliminating their potential danger, are devised. Moreover, some new ideas that will be used in our future research work are proposed.
Juan José Ramírez-sanchis - One of the best experts on this subject based on the ideXlab platform.
-
HICSS - Security Threats in Zigbee-Enabled Systems: Vulnerability Evaluation, Practical Experiments, Countermeasures, and Lessons Learned
2013 46th Hawaii International Conference on System Sciences, 2013Co-Authors: Niko Vidgren, Keijo Haataja, José Luis Patiño-andres, Juan José Ramírez-sanchis, Pekka ToivanenAbstract:In this paper, two practical attacks against Zigbee security are proposed and the latter one is also carried out in our laboratory environment. The attack scenarios are based on utilizing several vulnerabilities found from the main security components of Zigbee technology. The first attack is based on sabotaging the Zigbee End-Device by sEnding a special signal that makes it wake-up constantly until the battery runs out. The second attack is based on exploiting the key exchange process in Zigbee when using the Standard Security level defined by the Zigbee specification: we also demonstrate with experimental figures that attacks against Zigbee-enabled Devices become practical by using our attack scenario. In addition, countermeasures that rEnder the proposed attacks impractical, although not totally eliminating their potential danger, are devised. Moreover, some new ideas that will be used in our future research work are proposed.
-
Security Threats in Zigbee-Enabled Systems: Vulnerability Evaluation, Practical Experiments, Countermeasures, and Lessons Learned
2013 46th Hawaii International Conference on System Sciences, 2013Co-Authors: Niko Vidgren, Keijo Haataja, José Luis Patiño-andres, Juan José Ramírez-sanchis, Pekka ToivanenAbstract:In this paper, two practical attacks against Zigbee security are proposed and the latter one is also carried out in our laboratory environment. The attack scenarios are based on utilizing several vulnerabilities found from the main security components of Zigbee technology. The first attack is based on sabotaging the Zigbee End-Device by sEnding a special signal that makes it wake-up constantly until the battery runs out. The second attack is based on exploiting the key exchange process in Zigbee when using the Standard Security level defined by the Zigbee specification: we also demonstrate with experimental figures that attacks against Zigbee-enabled Devices become practical by using our attack scenario. In addition, countermeasures that rEnder the proposed attacks impractical, although not totally eliminating their potential danger, are devised. Moreover, some new ideas that will be used in our future research work are proposed.