Zigbee Attack Essay

Improved Essays
packets. This will drain the battery of the Zigbee module and can be used to disable the device [9].
The second and most overlooked attack is a physical attack on the actual Zigbee device. Zigbee devices are not very secure. They often store the network key information in plain text without encryption or password protection. Simple AT commands can often be used to retrieve this information if the device is physically accessible. All Zigbee devices in the network have access to the encryption keys so that packets can be encoded and decoded. As a result, an attacker only needs to find the weak link in the network and exploit it to gain access to the key information. Zigbee devices are often spread out and in remote locations. This creates an easy target
…show more content…
ATTACK IMPLEMENTATION
This Section describes my attempts to attack a Zigbee network. For these tests I did not have access to a pure Zigbee device, so instead I used the XBee radio. Xbee’s use the same underlying 802.15.4 protocol but instead of the Zigbee protocol layers, they use their own networking and application layer protocols. The Xbee and Zigbee protocols are very similar. In addition to the Xbee devices, I also used the Texas Instruments CC2531 as an 802.15.4 packet sniffer.
The first attack that I tried to implement was a packet sniffing attack using the CC2531. This chipset is able to receive and decode 802.15.4 packets and pass them on to the computer’s network card so that they can be displayed in programs such as Wireshark. However, I ran into issues installing the device drivers for the sniffer. The sniffer only has drivers for Windows but I have an Apple computer. If the sniffer worked, I would be able to receive the raw 802.15.4 packets and pipe the data into the Zigbee decoder that was developed with the KillerBee framework. This software is able to extract the network key from the packet data [8]. Once the network key is pulled from the packet data it can be used gain access to the Zigbee

Related Documents

  • Improved Essays

    Nt1310 Unit 5 Lab Report

    • 362 Words
    • 2 Pages

    To perform the Radio access network using two methods: a) Using Wireless Insite (commonly known as built in post processing). b) Using MATLAB (commonly known as the post-processing). c) Cell association and cell dominance formation using wireless Insite to get UE to be associated(served) with single femtocell eNB(preferred to be robust signal) and viewing it (UE). Fig2. Cell association for the UEs 4.…

    • 362 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    SYSTEM IMPLEMENTATION: At some fixed interval the PC Master sends request to the Wireless sensor node through the sub master for Data collection. The request send by the PC Master is in the form of frames. The frame which is transmitted by PC master will contain both the sub master id & the wireless sensor node id from where the data should be retrieved. The sub master receives the frame is then check for the wireless sensor node id…

    • 358 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Attackers exploiting default configurations to gain access to the network and to information stored on devices in the network are major threat to home gateway devices. In order to mitigate this threat there are many common default configurations a user should change. When setting up a home network, a user should make sure to change the default passwords. They should set up a strong account password and wifi password using best practices. The user should use a strong security protocol such as WPA2 instead of the default WEP which is not secure.…

    • 693 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    Pm3110 Unit 4 Test Paper

    • 1148 Words
    • 5 Pages

    Each virtual way is dispensed an altered measure of transfer speed. Virtual ways don't powerfully change their data transfer capacities past what has been assigned. 4. What are the three layers of IEEE 802 reference models? What are their major functions?…

    • 1148 Words
    • 5 Pages
    Great Essays
  • Improved Essays

    The operation is a simple XOR between each byte of the State and each byte of the sub-key. As initially 11 arrays are formed out of that 1 use for initialization process and from that array key expansion is done. Thus the keys formed total W43 which are used further for next 10 rounds. Each round uses 4 word key along with plaintext/cipher text. V Conclusion…

    • 634 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    VII. REFERENCES: [1] JaydpSen,”A survey on Wireless Sensor network Security”,Technical report 55-77,International Journal of Communication Networks and Information Security(IJCNIS)Vol 1,No2 August 2009. [2] Vidhani Kumar and Manik Lal Das,”Securing Wireless Sensor Networks with Public Key Techniques Adhoc & Sensor Wireless Networks”,pp189-201,2008. [3]” Security architecture for the Internet Protocol”,RFC 2401,November 2013. [4 ]http://www.ssh.com [5] D.W.Carman,P.S.Krus and B.J.Matt,”Constraints and approaches for distributed sensor network security”,Technical Report 00-010,NAI Labs,Network Associates Inc., Glenwood MD,2012.…

    • 637 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    With this, a compromised node running malicious code disguised as a legitimate node continuously seeks to find ways to disrupt communication and paralyze the network. However, node compromise attack is severe when the base node is compromised. Therefore, different activities like stealing secrets from the encrypted data, reporting wrong and misleading information to the network, reporting other legitimate nodes as compromised nodes, launching different routing attacks takes place. The best way to counter node compromise is to utilize code testing schemes which employ an optimal program verification process to verify the memory of a sensor node by calculating the hash values of randomly selected memory regions.…

    • 869 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Have you recently gotten a bonus or a promotion and are thinking about buying a new car? Have your previous cars been used ones from the 80s or 90s and now you're wondering about the transponder keys that come with many modern vehicles? A transponder key isn't complicated, but may seem strange if you've never before personally owned a vehicle that used one. Here are the answers to some questions you may have about your new potential purchase: How are duplicate keys handled? Nearly everyone worries about the potential for accidentally being locked out of their vehicle.…

    • 466 Words
    • 2 Pages
    Improved Essays
  • Great Essays

    Our Wi-Fi network is based on the IEEE 802.11 b/g standards, which is the most commonly used…

    • 884 Words
    • 4 Pages
    Great Essays
  • Decent Essays

    Zombee's Research Paper

    • 71 Words
    • 1 Pages

    A biologist John Hafer was the first to notice the zombee’s. When a female zombie fly lands on any honey bee and she inject fly eggs into the honey bee. When the larvae are ready they burst out of the bee.(up to 16 can come out of a single bee!) They wanted to know if the zombee’s are just in San Francisco or are they in other parts of the…

    • 71 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Osama bin Laden’s Plan of Attack Results in the United States Plan to Kill “For bin Laden, Islam was more than just a religion: It shaped his political beliefs and influenced every decision he made” (History, n.d., paragraph 3). Bin Laden believed strongly in Islam, which influenced some of his most life changing decisions. Osama bin Laden planned to attack the US, because he believed that Islam still needed to seek revenge on the US for declaring war on them; his plan of attack suddenly turns into the US’s plan of attack to kill him shortly after 9/11. Osama bin Laden was born to Mohammed bin Laden, a Yemeni millionaire immigrant, in 1957. Mohammed had a total of eleven wives before he gave birth to bin Laden; bin Laden being seventeen out of fifty- two children.…

    • 1044 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Good Uses Of Drones Essay

    • 1558 Words
    • 7 Pages

    Would the use of drones in the U.S. be a good thing? Drones offer a multitude of good uses for the people of America but there a few bad uses as well. A couple of the good uses for drones would be commercially by businesses or they could be used on the police force as well! Both of these examples would provide the greatest positive affect on America. Criminals and enemies of the U.S. could possibly use the drones against the U.S. COMMERCIAL USE OF DRONES FOR BUSINESSES…

    • 1558 Words
    • 7 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Lab 4.3

    • 653 Words
    • 3 Pages

    5.1.4.3 Lab — Using Wireshark to Examine Ethernet Frames Part 1: Examine the Header Fields in an Ethernet II Frame Part 2: Use Wireshark to Capture and Analyze Ethernet Frames Part 1: Examine the Header Fields in an Ethernet II Frame What is significant about the contents of the destination address field? It starts with the broadcast ARP protocol from the router asking who has 192.168.2.22.…

    • 653 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    Narrative Essay On Beep

    • 1078 Words
    • 4 Pages

    Trophy Deer Beep... Beep... Beep... Beep. This is the sound our alarm clock made at 4:30 on the morning of November 24, 2015.…

    • 1078 Words
    • 4 Pages
    Great Essays
  • Improved Essays

    Al Qaeda Essay

    • 1731 Words
    • 7 Pages

    Al Qaeda With the war on terrorism becoming more and more violent, US officials are looking for a way to stop the violence that Al Qaeda is inflicting on the United States of America. Al Qaeda isn’t a new problem to the United States. Al Qaeda is defined as “a radical Sunni Muslim organization dedicated to the elimination of a Western presence in Arab countries and militantly opposed to Western foreign policy: founded by Osama bin Laden in 1988” (Dictionary.com). “In approximately 1989, bin Laden and co-defendant Muhammad, Alef founded “Al Qaeda,” an international terrorist group. This group was dedicated to opposing non-…

    • 1731 Words
    • 7 Pages
    Improved Essays