With the demand and rise of electronic equipment’s, new technologies are being developed and deployed to meet the global demands. Zigbee is one such technology in rise with low power consumption and low-cost to meet the rising market of Internet of things (IoT) networks. Zigbee is generally deployed for applications which use low data rate and low power consumption and is an open standard worldwide. Zigbee uses a different protocol than Wi-Fi networks where it uses a mesh networking protocol to create a self-healing architecture, thereby supporting much lower data rates than Wi-Fi.
Exploitation in ZigBee devices:
Although Zigbee was claimed to be one of the most secured technology deployed for the use in the smart and IoT devices, …show more content…
These devices are exploited by assuming that because of their low cost, low power consumption and limited capabilities their hardware is not tamper resistant, which paves way for the attacker to further penetrate and exploit the ZigBee network.
Different types of attacks against ZigBee:
ZigBee is based on 802.15.4 protocol, but however security is not very well implemented by the developers in ZigBee. This has attracted a lot of information security professional to look into the security capabilities of the 802.15.4 protocol and also the implementation of ZigBee radios in the IoT devices. The numerous attacks against ZigBee has been identified and can be classed under the following categories namely,
Some ZigBee networks do not use proper encryption and attackers can take this advantage to sniff all the communications with the use of proper equipment’s. Sniffing attack in a ZigBee network generally refers to the process of collecting all the available information from a network, which is possible in a network which implements the standard generic security level protocols for communication. This can be prevented by implementing high security by preinstalling the network key on the ZigBee …show more content…
• The ZigBee network infrastructure should always be protected with the help of a Network key. The network key is implemented at all the nodes and end point including the routers, gateways and devices are made secured. In this way nodes without a valid network key won’t be allowed to enter into the ZigBee infrastructure, thus securing the network and validating it up to a certain extent.
• Employing address filtering at the MAC layer is another security recommendation that must be kept in mind as it is in line with the IEEE 802.15.4 standard and is sometimes referred to as Access Control List (ACL) mode. Depending on the ZigBee vendor this feature should be utilized by all the nodes in the network.
• Source node authentication should be implemented across all the nodes if the ZigBee vendor supports it, this will help in the identification of the transmitting