메뉴 건너뛰기




Volumn , Issue , 2013, Pages 5132-5138

Security threats in ZigBee-enabled systems: Vulnerability evaluation, practical experiments, countermeasures, and lessons learned

Author keywords

[No Author keywords available]

Indexed keywords

ATTACK SCENARIOS; LABORATORY ENVIRONMENT; LESSONS LEARNED; SECURITY COMPONENTS; SECURITY THREATS; VULNERABILITY EVALUATIONS; ZIGBEE SPECIFICATIONS; ZIGBEE TECHNOLOGY;

EID: 84875537166     PISSN: 15301605     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/HICSS.2013.475     Document Type: Conference Paper
Times cited : (96)

References (24)
  • 2
    • 84875545499 scopus 로고    scopus 로고
    • IEEE. [Accessed Sep. 6, 2012]
    • IEEE, IEEE 802.15.4-2003 Specification. [Online]. Available http://standards.ieee.org/getieee802/download/802.15.4-2003.pdf. [Accessed Sep. 6, 2012].
    • IEEE 802.15.4-2003 Specification
  • 3
    • 84875545499 scopus 로고    scopus 로고
    • IEEE. [Accessed Sep. 6, 2012]
    • IEEE, IEEE 802.15.4-2006 Specification. [Online]. Available http://standards.ieee.org/getieee802/download/802.15.4-2006.pdf. [Accessed Sep. 6, 2012].
    • IEEE 802.15.4-2006 Specification
  • 4
    • 84875519681 scopus 로고    scopus 로고
    • My bandwidth is wider than yours: Ultra-wideband
    • Accessed Sep. 6, 2012
    • I. Pérez-González, My Bandwidth Is Wider Than Yours: Ultra-Wideband, Wireless USB and WiNET in Linux. [Online]. Available: http://ols.fedoraproject.org/OLS/Reprints-2007/perez-gonzalez-Reprint.pdf. [Accessed Sep. 6, 2012].
    • Wireless USB and WiNET in Linux
    • Pérez-González, I.1
  • 7
    • 2942656255 scopus 로고    scopus 로고
    • Secure routing in wireless sensor networks: Attacks and countermeasures
    • C. Karlof and D. Wagner, "Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures," Elsevier Ad Hoc Networks, Vol. 1, pp. 293-315, 2003.
    • (2003) Elsevier Ad Hoc Networks , vol.1 , pp. 293-315
    • Karlof, C.1    Wagner, D.2
  • 13
    • 84875481889 scopus 로고    scopus 로고
    • Extracting keys from second generation zigbee chips
    • Las Vegas, USA, [Accessed Sep. 6, 2012]
    • T. Goodspeed, "Extracting Keys from Second Generation Zigbee Chips," Black Hat USA 2009, Las Vegas, USA, 2009. [Online]. Available http://www.blackhat.com/presentations/bh-usa-09/GOODSPEED/BHUSA09-Goodspeed- ZigbeeChips-PAPER.pdf. [Accessed Sep. 6, 2012].
    • Black Hat USA 2009 , pp. 2009
    • Goodspeed, T.1
  • 14
    • 85027486004 scopus 로고    scopus 로고
    • Accessed Sep. 6, 2012
    • GoodFET Project. [Online]. Available: http://goodfet.sourceforge. net. [Accessed Sep. 6, 2012].
    • GoodFET Project
  • 18
    • 84875554198 scopus 로고    scopus 로고
    • Accessed Sep. 6, 2012
    • T. Buley, My Man, ZigBee. [Online]. Available: http://www.forbes.com/ 2009/01/11/zigbee-mirage-ces-tech-personal-cz-tb0112zigbee.html. [Accessed Sep. 6, 2012].
    • My Man, ZigBee
    • Buley, T.1
  • 19
    • 84875550770 scopus 로고    scopus 로고
    • ZigBee Case Study. Accessed Sep. 6, 2012
    • Telegesis Ltd., ZigBee Case Study, Hotech Edge Ltd Safely Networks Safes with ZigBee!. [Online]. Available: http://www.telegesis.com/downloads/general/ Hotech%20Edge%20success%20story.pdf. [Accessed Sep. 6, 2012].
    • Hotech Edge Ltd Safely Networks Safes with ZigBee!
  • 20
    • 84875516183 scopus 로고    scopus 로고
    • Ember Corporation [Accessed Sep. 6, 2012]
    • Ember Corporation, ZigBee Slashes Hotel Energy Costs by up to 40 Percent. [Online]. Available: http://www.thefreelibrary.com/ ZigBee+slashes+hotel+energy+costs+by+up+to+40+percent.-a0154056797. [Accessed Sep. 6, 2012].
    • ZigBee Slashes Hotel Energy Costs by Up to 40 Percent
  • 23
    • 33748995703 scopus 로고    scopus 로고
    • Detecting impersonation attacks in future wireless and mobile networks
    • Springer-Verlag
    • M. Barbeau, J. Hall, and E. Kranakis, "Detecting Impersonation Attacks in Future Wireless and Mobile Networks," Lecture Notes in Computer Science, vol. 4074, pp. 80-95, Springer-Verlag, 2006.
    • (2006) Lecture Notes in Computer Science , vol.4074 , pp. 80-95
    • Barbeau, M.1    Hall, J.2    Kranakis, E.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.