Proceedings of the 9th International Conference on Network and Service Management (CNSM 2013) 2013
DOI: 10.1109/cnsm.2013.6727840
|View full text |Cite
|
Sign up to set email alerts
|

Thwarting attacks on ZigBee - Removal of the KillerBee stinger

Abstract: Wireless Sensor Networks (WSNs) have recently emerged as an important research topic. Due to the enormous number of sensor nodes and the constrained resources, specific research challenges can be identified with respect to security. Almost all available commercial and research sensor nodes are equipped with ZigBee transceiver chips, and thus making ZigBee the de-facto standard in WSN communication. Since Joshua Wright's KillerBee Framework was released with its focus on exploring and exploiting the security of… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
11
0

Year Published

2014
2014
2024
2024

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 33 publications
(13 citation statements)
references
References 11 publications
0
11
0
Order By: Relevance
“…Additionally, ZigBee provides minimal replay protection, a 4-octet frame counter, so using zbreplay can be extremely effective attacking strategy. In [8] the authors provide a proof of concept for using an anomaly-based detection system in order to prevent association and replay flooding on a network. They claim that an anomaly-based intrusion detection system is more feasible than a pattern-based system because it uses fewer resources, which are scarce on ZigBee devices.…”
Section: Exploiting Zigbee Securitymentioning
confidence: 99%
“…Additionally, ZigBee provides minimal replay protection, a 4-octet frame counter, so using zbreplay can be extremely effective attacking strategy. In [8] the authors provide a proof of concept for using an anomaly-based detection system in order to prevent association and replay flooding on a network. They claim that an anomaly-based intrusion detection system is more feasible than a pattern-based system because it uses fewer resources, which are scarce on ZigBee devices.…”
Section: Exploiting Zigbee Securitymentioning
confidence: 99%
“…ZigBee. ZigBee is widely used in pervasive computing due to its low bandwidth, low cost, and low power consumption (Stelte and Rodosek, 2013). Our vulnerability analysis is based on KillerBee 2 , in particular on its zbtumbler tool, which detects active ZigBee networks, records and display information about the found devices.…”
Section: Security and Protocolsmentioning
confidence: 99%
“…zbreplay lounges a replay attack, which is countered in (Stelte and Rodosek, 2013). Another MITM attack is explained in (Choi et al, 2013) and exploits a vulnerability in the key distribution.…”
Section: Security and Protocolsmentioning
confidence: 99%
See 1 more Smart Citation
“…Such retrieval requires the attacker to be located in proximity of the network nodes, in order to sniff the key exchange. Killerbee also includes other threats such as replay [19] or manipulation/injection [20].…”
Section: Related Workmentioning
confidence: 99%