Institutional Repository
Institutional Repository Institutional Repository Login  Institutional Repository  
  • UOC Library |
  •  |
  •  |

Home >
Research >
Techonology and Communication >
Computer Science, Technology and Multimedia >
Parts of books or chapters of books >

Please use this identifier to cite or link to this item: http://hdl.handle.net/10609/8752
Title: ZigBee/ZigBee PRO security assessment based on compromised cryptographic keys
Autor: Radmand, Pedram
Carlsen, Simon
Petersen, Stig
Talevski, Alex
Arnedo Moreno, Joan
Singh, Jaipal
Domingo Prieto, Marc
Keywords: Zigbee
security
Issue Date: 4-Nov-2010
Editorial: IEEE Press
Type: Capítulo o parte de libro
Citación: Radmand, P.;Domingo, M.;Singh, J.;Arnedo, J.;Talevski, A.;Petersen, S.;Carlsen, S.. (2010). "ZigBee/ZigBee PRO security assessment based on compromised cryptographic keys". A:.Proceedings of the 1st Workshop on First International Workshop on Securing Information in Distributed Environments and Ubiquitous Systems (SIDEUS'10).Fukuoka.IEEE Press . Pág. 465 - 470.
Series/Report no.: Proceedings of the 1st Workshop on First International Workshop on Securing Information in Distributed Environments and Ubiquitous Systems (SIDEUS'10)
Abstract: Sensor networks have many applications in monitoring and controlling of environmental properties such as sound, acceleration, vibration and temperature. Due to limited resources in computation capability, memory and energy, they are vulnerable to many kinds of attacks. The ZigBee specification based on the 802.15.4 standard, defines a set of layers specifically suited to sensor networks. These layers support secure messaging using symmetric cryptographic. This paper presents two different ways for grabbing the cryptographic key in ZigBee: remote attack and physical attack. It also surveys and categorizes some additional attacks which can be performed on ZigBee networks: eavesdropping, spoofing, replay and DoS attacks at different layers. From this analysis, it is shown that some vulnerabilities still in the existing security schema in ZigBee technology.
Language: eng
URI: http://hdl.handle.net/10609/8752
Appears in Collections:Parts of books or chapters of books


Add This:

RefWorks:

Ratings:
  0 (0 valuations)


Files in This Item:

File Description SizeFormat
2009_SIDEUS.pdf184,17 kBAdobe PDFPreview  Download

Author names in Twitter


Author names in FriendFeed



Recommend this item

SFX Query

This item is licensed under a Creative Commons License
Creative Commons

Items in Repository e are protected by copyright, with all rights reserved, unless otherwise indicated.

 

The library replies
A product of the Universitat Oberta de Catalunya Virtual Library