2018
DOI: 10.1109/msp.2018.1331033
|View full text |Cite
|
Sign up to set email alerts
|

IoT Goes Nuclear: Creating a Zigbee Chain Reaction

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
224
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
5
3
2

Relationship

0
10

Authors

Journals

citations
Cited by 173 publications
(228 citation statements)
references
References 4 publications
0
224
0
Order By: Relevance
“…Some of these bulbs, such as the popular Philips Hues, have been compromised and researchers showed how easy is to set up a car, or even a drone, that drives in a residential area aiming to infect as much bulbs as possible with a crippling malware. This malware is able to shut them down or even force them to flicker on and off at desired speed [12].…”
Section: A Security and Privacy Disastermentioning
confidence: 99%
“…Some of these bulbs, such as the popular Philips Hues, have been compromised and researchers showed how easy is to set up a car, or even a drone, that drives in a residential area aiming to infect as much bulbs as possible with a crippling malware. This malware is able to shut them down or even force them to flicker on and off at desired speed [12].…”
Section: A Security and Privacy Disastermentioning
confidence: 99%
“…The example of the smart lamps in [14] is interesting because the global attack involved a first hardware attack (here, a Correlation Power Analysis, or CPA, attack) in order to extract the master secret key for each type of lamp; then the key was used to propagate a worm through Zigbee connections, the modified firmware being authenticated with the extracted key. With this combination of hardware and software attack, the researchers demonstrated their capability to take control of a very large number of lamps in a whole city area, making for example feasible a massive DDoS (Distributed Deny of Service) attack even making use of a drone to extend the attack area.…”
Section: Concrete Motivation Examples and The Need For Hardware Protementioning
confidence: 99%
“…Indeed, Gent found that the adopted ZigBee network key can be retrieved if an attacker can sniff the reinitialization process accomplished by the bulbs after a reset and if he knows the ZigBee Light Link master key [36]. Another attack on ZigBee Light Link is proposed by Ronen et al, creating a worm that automatically infects adjacent bulbs, building a custom infected firmware, and being deployed as a fake OTA update [37].…”
Section: Related Workmentioning
confidence: 99%