Zigbee Case Study

Great Essays
Overview:
With the demand and rise of electronic equipment’s, new technologies are being developed and deployed to meet the global demands. Zigbee is one such technology in rise with low power consumption and low-cost to meet the rising market of Internet of things (IoT) networks. Zigbee is generally deployed for applications which use low data rate and low power consumption and is an open standard worldwide. Zigbee uses a different protocol than Wi-Fi networks where it uses a mesh networking protocol to create a self-healing architecture, thereby supporting much lower data rates than Wi-Fi.

Exploitation in ZigBee devices:
Although Zigbee was claimed to be one of the most secured technology deployed for the use in the smart and IoT devices,
…show more content…
These devices are exploited by assuming that because of their low cost, low power consumption and limited capabilities their hardware is not tamper resistant, which paves way for the attacker to further penetrate and exploit the ZigBee network.

Different types of attacks against ZigBee:
ZigBee is based on 802.15.4 protocol, but however security is not very well implemented by the developers in ZigBee. This has attracted a lot of information security professional to look into the security capabilities of the 802.15.4 protocol and also the implementation of ZigBee radios in the IoT devices. The numerous attacks against ZigBee has been identified and can be classed under the following categories namely,
• Sniffing
Some ZigBee networks do not use proper encryption and attackers can take this advantage to sniff all the communications with the use of proper equipment’s. Sniffing attack in a ZigBee network generally refers to the process of collecting all the available information from a network, which is possible in a network which implements the standard generic security level protocols for communication. This can be prevented by implementing high security by preinstalling the network key on the ZigBee
…show more content…
• The ZigBee network infrastructure should always be protected with the help of a Network key. The network key is implemented at all the nodes and end point including the routers, gateways and devices are made secured. In this way nodes without a valid network key won’t be allowed to enter into the ZigBee infrastructure, thus securing the network and validating it up to a certain extent.
• Employing address filtering at the MAC layer is another security recommendation that must be kept in mind as it is in line with the IEEE 802.15.4 standard and is sometimes referred to as Access Control List (ACL) mode. Depending on the ZigBee vendor this feature should be utilized by all the nodes in the network.
• Source node authentication should be implemented across all the nodes if the ZigBee vendor supports it, this will help in the identification of the transmitting

Related Documents

  • Improved Essays

    This kind of attack uses the weakness of the mechanism of link discovery service that the host can involve into the link discovery operation. The general operation of finding internal link is following: At the first, after initialization, the controller contributes connection to all switches, while the internal link between switches is unknown. In order to find internal link, the controller will send the Packet-out message with the payload of LLDP packets to switches; Secondly, the switch will flood the LLDP packets to all enabled ports; Thirdly, when another switch receives the LLDP packets, it will send the Packet-in message with the payload of LLDP packets to the controller. Under this procedure, the switch cannot prevent the host to get the LLDP packet.…

    • 647 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    2. The IEEE 802.11n:- The IEEE 802.11n standard, appear in 2008, And become popular because the jump in data transfer rates from about 54 Mbps to nearly 600 Mbps. The IEEE 802.11n standard was officially completed in 2009 but most of the technical features were ratified in 2007. Most companies supported for the creation of a 60 GHz based standard for WLANs to succeed the 802.11n standard, and a lot of attention and effort was devoted to this activity.…

    • 620 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    If the sensed parameters at one of the wireless sensor node are not as per the expected parameters, then the controlling action will be taken by the PC master terminal. We have a main PC master terminal which has the VB software already installed into it .The PC master terminal which is used to monitor the status of all the wireless sensor nodes which covers the whole area. This reduces cable connections and accidental potential due complexity of cables. RF transmitter namely IEEE802.15.4 technology standard, is one of the WPAN standards.…

    • 358 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Attackers exploiting default configurations to gain access to the network and to information stored on devices in the network are major threat to home gateway devices. In order to mitigate this threat there are many common default configurations a user should change. When setting up a home network, a user should make sure to change the default passwords. They should set up a strong account password and wifi password using best practices. The user should use a strong security protocol such as WPA2 instead of the default WEP which is not secure.…

    • 693 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    The issues and possible risks in using wireless communication. There are few security risks occurring in mobile and wireless user: A. Intrusion - networks are more open to intruder access unless protective measures (such as passwords, encryption and identifier disabling) are adopted and this may result in a greater susceptibility to theft or misuse of information contained on networks, unauthorized destruction or modification of data, and abuse of network capacity B. Leeching - bandwidth can be used by intruders at the expense of legitimate businesses and users C. Exploitation - network access can be misused to launch denial of service (DoS) attacks against third parties, transmit illicit material such as child pornography, or engage in other criminal activities. [10] 5. Conclusion: The report introduced three wireless generations which have been using for the last few decades.…

    • 1458 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    User connectivity will be controlled and authenticated through active directory. User devices will require and object to be created in active directory which will be used to authenticate the device using 802.1x. When a user device is connected to the network it will initially communicate on a VLAN will only be allowed to communicate with active directory. Then once the device has been authenticated it will place the device on the appropriate VLAN that it will operate on. Any device that has not been set up in Active Directory will be placed into a null VLAN which will not grant access to the network.…

    • 707 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    As the number of IoT devices in the future increases there will be an overwhelming amount of data that needs to be processed, analyzed and transferred back to the end device. For this a robust architecture is needed that is capable of processing high amount of data in real time in a very fast and orderly process. The storage of such huge data also must be taken into consideration. This is because there should be a centralized data management system.…

    • 1436 Words
    • 6 Pages
    Great Essays
  • Great Essays

    Abstract: With a specific end goal to outline and fabricate the secured network system, numerous elements must be thought seriously about, for example, the topology and position of hosts inside of the system, the determination of equipment and programming innovations, what's more, the cautious arrangement of every part. My paper will be an examination of the issues percentage in outlining a safe Local Area Network (LAN) and a best's portion practices proposed by security specialists. I will examine securing a LAN from network's perspective. [1] Introduction: With most complex innovations, there's not one size-fits-all arrangement regarding the matter of network administration. The needs and assets of every one of a kind association will relate…

    • 877 Words
    • 4 Pages
    Great Essays
  • Improved Essays

    Nt1310 Unit 1

    • 768 Words
    • 4 Pages

    1. Policies: Policies like Acceptable Use, Internet Access, and Email and Communications Policies can take the risk out of the user’s hands of doing what is right. Sites that could hold malicious codes and viruses can simply be blocked from access so that it isn’t even in their “hands” to make the decision. 2. Provision Servers: Using software like IPAM, making sure that your servers all have static addresses assigned to them.…

    • 768 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    With this, a compromised node running malicious code disguised as a legitimate node continuously seeks to find ways to disrupt communication and paralyze the network. However, node compromise attack is severe when the base node is compromised. Therefore, different activities like stealing secrets from the encrypted data, reporting wrong and misleading information to the network, reporting other legitimate nodes as compromised nodes, launching different routing attacks takes place. The best way to counter node compromise is to utilize code testing schemes which employ an optimal program verification process to verify the memory of a sensor node by calculating the hash values of randomly selected memory regions.…

    • 869 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Nt1330 Unit 6 Igms

    • 2070 Words
    • 9 Pages

    1.Describe the key security enhancements in UMTS that overcome GSM design weaknesses? Ans: 1. Encryption algorithms used in GSM were not disclosed, aiming to achieve ‘security through obscurity’. Their shortcomings were discovered by reverse engineering an actual GSM phone. The design of algorithms was kept secret (it was disclosed only on a need-to-know basis, under and non-disclosure agreement, to GSM manufacturers).…

    • 2070 Words
    • 9 Pages
    Improved Essays
  • Great Essays

    Our Wi-Fi network is based on the IEEE 802.11 b/g standards, which is the most commonly used…

    • 884 Words
    • 4 Pages
    Great Essays
  • Improved Essays

    Natural Driving Quiz

    • 462 Words
    • 2 Pages

    DIGITAL FORENSIC AND INCIDENT REPORTING QUIZ 1. Destroying data, on a hard drive, is relatively easy and can be done one of two ways: a. Destroying the platters b. Wiping the entire hard drive c. Placing magnets on a hard drive d.…

    • 462 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    CSE 543: Individual Report

    • 1293 Words
    • 6 Pages

    Implications of IoT in Health-care Data Security CSE 543 – Individual Report Nishtha Punjabi Computer Science (MCS), Ira A. Fulton School of Engineering Arizona State University, Tempe, AZ, United States npunjab1@asu.edu Abstract— As society increasingly relies on digitally stored and accessed information, traditional information security technologies, policies, management and practices are found more and more limited in satisfying the security and assurance needs of modern information systems and applications. Incorporating new technology into the healthcare organization’s processes is risky because of the potential for patient information being disclosed. The Internet of things (IoT) is the inter-networking of physical devices, vehicles…

    • 1293 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    They amuse data gathers by cookies and different innovations, such as insensitive information (Apple, 2014). Besides, Apple 's map services, give the precision into its GPS administrations (Staff, 2015). IOS gadgets gives new security viewpoints, but they have easy to utilize. Numerous angles are empowered naturally, along these lines IT divisions don 't require to execute wide designs. Most security aspects as gadget encryption are not configurable, subsequently clients can 't…

    • 905 Words
    • 4 Pages
    Improved Essays