2015 IEEE 40th Local Computer Networks Conference Workshops (LCN Workshops) 2015
DOI: 10.1109/lcnw.2015.7365922
|View full text |Cite
|
Sign up to set email alerts
|

Rogue Z-Wave controllers: A persistent attack channel

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
13
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 29 publications
(16 citation statements)
references
References 9 publications
0
13
0
Order By: Relevance
“…Of interest here are CPS implementations using ZWave WPAN devices that 1) lack robust security and 2) which are readily exploitable (hackable) [13], [14]. Device hardware ID and operating state discrimination for CI security applications has been reliably demonstrated using Physical (PHY) layer security enhancement [4], [9], [15].…”
Section: Introductionmentioning
confidence: 99%
“…Of interest here are CPS implementations using ZWave WPAN devices that 1) lack robust security and 2) which are readily exploitable (hackable) [13], [14]. Device hardware ID and operating state discrimination for CI security applications has been reliably demonstrated using Physical (PHY) layer security enhancement [4], [9], [15].…”
Section: Introductionmentioning
confidence: 99%
“…To enable the industrial IoT, CPS devices are finding increasing use in critical infrastructure, smart metering, and home automation [2,52]. CPS devices employ either open or proprietary protocols, with open protocols offering more aftermarket security options, but possibly more threats, while proprietary protocols offer "security through obscurity," but less additional aftermarket security options [53].…”
Section: Application and Example Resultsmentioning
confidence: 99%
“…G.9959 recommendation [52]. Since Z-wave is known to have security vulnerabilities [54], vetting the claimed identity of Z-wave devices through RF fingerprinting is important.…”
Section: Application and Example Resultsmentioning
confidence: 99%
“…The work in [56] capitalizes on a vulnerability to allow the placement of a rogue controller into the network, which allows building a hidden communication channel with any poorly-protected device. A more recent work on the security features of the same protocol [57] employs a real-world Z-Wave network and reverse engineered some critical networks aspects, including frame forwarding and topology management in an effort to identify intrinsic integrity vulnerabilities of the routing protocol.…”
Section: Z-wavementioning
confidence: 99%