2015 International Carnahan Conference on Security Technology (ICCST) 2015
DOI: 10.1109/ccst.2015.7389663
|View full text |Cite
|
Sign up to set email alerts
|

Cyber-security analysis and evaluation for smart home management solutions

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
4
0
1

Year Published

2017
2017
2021
2021

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(5 citation statements)
references
References 12 publications
0
4
0
1
Order By: Relevance
“…The next year, the authors of [54], after implementing a generic wireless monitor/injector tool based on Software Defined Radio using GNU Radio and the well-known Python Scapy library, were able via a replay attack to prevent a Z-Wave alarm device from arming. The work in [55] concentrates on the key derivation strategy of Z-Wave. To solve the identified deficiencies, the authors introduced a re-keying and IV derivation scheme.…”
Section: Z-wavementioning
confidence: 99%
“…The next year, the authors of [54], after implementing a generic wireless monitor/injector tool based on Software Defined Radio using GNU Radio and the well-known Python Scapy library, were able via a replay attack to prevent a Z-Wave alarm device from arming. The work in [55] concentrates on the key derivation strategy of Z-Wave. To solve the identified deficiencies, the authors introduced a re-keying and IV derivation scheme.…”
Section: Z-wavementioning
confidence: 99%
“…Communication Security. Communication security research emphasizes the security and privacy issues in smart home communication protocols such as BLE, ZigBee, and Z-Wave [14,1,50,27]. Agosta et al [1] approached the security and privacy problems involved in the key derivation algorithm adopted by the widespread Z-Wave home automation protocol.…”
Section: Related Workmentioning
confidence: 99%
“…Communication security research emphasizes the security and privacy issues in smart home communication protocols such as BLE, ZigBee, and Z-Wave [14,1,50,27]. Agosta et al [1] approached the security and privacy problems involved in the key derivation algorithm adopted by the widespread Z-Wave home automation protocol. Ronen et al [50] described a worm attack which has the potential of massive spread by exploiting an implementation bug in the ZigBee Light Link protocol.…”
Section: Related Workmentioning
confidence: 99%
“…The current trends on implementing security in smart home are using key exchanges and use of certificates and access control mechanism (Agosta, Antonini, Barenghi, Galeri, & Pelosi, 2015;Chitnis, Deshpande, & Shaligram, 2016). The smart home appliances manufactured by vendors uses their own industrial securities protocols (European Union Agency for Network and Information Secu-…”
Section: Introductionmentioning
confidence: 99%
“…Las tendencias actuales en la implementación de seguridad en el hogar inteligente están utilizando intercambios de clave y el uso de certificados y mecanismos de control de acceso (Agosta, Antonini, Barenghi, Galeri, & Pelosi, 2015;Chitnis, Deshpande, & Shaligram, 2016). Los electrodomésticos inteligentes fabricados por proveedores utilizan sus propios protocolos industriales de seguridad (European Union Agency for Network and Information Security, 2015; "Your home...", 2017; "hue: Your...", 2017).…”
Section: Introductionunclassified