针对ZigBee安全的三种实际攻击:攻击场景定义、实际实验、对策和经验教训

Olayemi Olawumi, Keijo Haataja, Mikko Asikainen, Niko Vidgren, Pekka J. Toivanen
{"title":"针对ZigBee安全的三种实际攻击:攻击场景定义、实际实验、对策和经验教训","authors":"Olayemi Olawumi, Keijo Haataja, Mikko Asikainen, Niko Vidgren, Pekka J. Toivanen","doi":"10.1109/HIS.2014.7086198","DOIUrl":null,"url":null,"abstract":"In this paper, three practical attacks against ZigBee security are carried out in our laboratory environment. The attack scenarios are based on utilizing several vulnerabilities found from the main security components of ZigBee technology. The first attack is based on discovering all ZigBee-enabled networks within range as well as the configurations of the corresponding ZigBee-enabled devices: This vital and fundamental basic information can be used for performing further and more severe attacks against the discovered ZigBee-enabled devices/networks. The second attack can be seen as an extension to the first attack and thus the prerequisite for it is the successful completion of the first attack. In the second attack, an attacker eavesdrops on the unencrypted or encrypted traffic of a ZigBee-enabled network in order to obtain and utilize any sensitive/useful information. The third attack is based on replaying (re-transmitting) the captured data as if the original sender is sending the data again. To keep this attack extremely simple, straightforward, and practical, we decided to devise and implement it without having a Man-In-The-Middle (MITM) between the victim devices, since the presence of the MITM would have made the attack very difficult to implement in practice, thus giving it only a theoretical relevance. Indeed, we demonstrate with experimental figures that attacks against ZigBee-enabled devices become practical by using our three attack scenarios. In addition, countermeasures that render the attacks impractical, although not totally eliminating their potential danger, are devised. Moreover, some new ideas that will be used in our future research work are proposed.","PeriodicalId":161103,"journal":{"name":"2014 14th International Conference on Hybrid Intelligent Systems","volume":"38 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"68","resultStr":"{\"title\":\"Three practical attacks against ZigBee security: Attack scenario definitions, practical experiments, countermeasures, and lessons learned\",\"authors\":\"Olayemi Olawumi, Keijo Haataja, Mikko Asikainen, Niko Vidgren, Pekka J. Toivanen\",\"doi\":\"10.1109/HIS.2014.7086198\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this paper, three practical attacks against ZigBee security are carried out in our laboratory environment. The attack scenarios are based on utilizing several vulnerabilities found from the main security components of ZigBee technology. The first attack is based on discovering all ZigBee-enabled networks within range as well as the configurations of the corresponding ZigBee-enabled devices: This vital and fundamental basic information can be used for performing further and more severe attacks against the discovered ZigBee-enabled devices/networks. The second attack can be seen as an extension to the first attack and thus the prerequisite for it is the successful completion of the first attack. In the second attack, an attacker eavesdrops on the unencrypted or encrypted traffic of a ZigBee-enabled network in order to obtain and utilize any sensitive/useful information. The third attack is based on replaying (re-transmitting) the captured data as if the original sender is sending the data again. To keep this attack extremely simple, straightforward, and practical, we decided to devise and implement it without having a Man-In-The-Middle (MITM) between the victim devices, since the presence of the MITM would have made the attack very difficult to implement in practice, thus giving it only a theoretical relevance. Indeed, we demonstrate with experimental figures that attacks against ZigBee-enabled devices become practical by using our three attack scenarios. In addition, countermeasures that render the attacks impractical, although not totally eliminating their potential danger, are devised. Moreover, some new ideas that will be used in our future research work are proposed.\",\"PeriodicalId\":161103,\"journal\":{\"name\":\"2014 14th International Conference on Hybrid Intelligent Systems\",\"volume\":\"38 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2014-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"68\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2014 14th International Conference on Hybrid Intelligent Systems\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/HIS.2014.7086198\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 14th International Conference on Hybrid Intelligent Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/HIS.2014.7086198","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 68

摘要

本文在实验室环境下对ZigBee安全进行了三种实际的攻击。攻击场景基于利用从ZigBee技术的主要安全组件中发现的几个漏洞。第一种攻击是基于发现范围内所有支持zigbee的网络以及相应的支持zigbee的设备的配置:这些重要和基本的基本信息可用于对发现的支持zigbee的设备/网络进行进一步和更严重的攻击。第二次攻击可以看作是第一次攻击的延伸,因此第二次攻击的先决条件是第一次攻击的成功完成。在第二种攻击中,攻击者窃听支持zigbee的网络的未加密或加密流量,以获取和利用任何敏感/有用的信息。第三种攻击是基于重放(重新传输)捕获的数据,就好像原始发送方再次发送数据一样。为了使这种攻击非常简单、直接和实用,我们决定在受害者设备之间不使用中间人(MITM)的情况下设计和实现它,因为MITM的存在会使攻击在实践中很难实现,从而只给它一个理论相关性。实际上,我们用实验数据证明,通过使用我们的三种攻击场景,针对支持zigbee的设备的攻击变得切实可行。此外,还设计了使攻击变得不切实际的对策,尽管不能完全消除其潜在危险。最后,对今后的研究工作提出了一些新的思路。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Three practical attacks against ZigBee security: Attack scenario definitions, practical experiments, countermeasures, and lessons learned
In this paper, three practical attacks against ZigBee security are carried out in our laboratory environment. The attack scenarios are based on utilizing several vulnerabilities found from the main security components of ZigBee technology. The first attack is based on discovering all ZigBee-enabled networks within range as well as the configurations of the corresponding ZigBee-enabled devices: This vital and fundamental basic information can be used for performing further and more severe attacks against the discovered ZigBee-enabled devices/networks. The second attack can be seen as an extension to the first attack and thus the prerequisite for it is the successful completion of the first attack. In the second attack, an attacker eavesdrops on the unencrypted or encrypted traffic of a ZigBee-enabled network in order to obtain and utilize any sensitive/useful information. The third attack is based on replaying (re-transmitting) the captured data as if the original sender is sending the data again. To keep this attack extremely simple, straightforward, and practical, we decided to devise and implement it without having a Man-In-The-Middle (MITM) between the victim devices, since the presence of the MITM would have made the attack very difficult to implement in practice, thus giving it only a theoretical relevance. Indeed, we demonstrate with experimental figures that attacks against ZigBee-enabled devices become practical by using our three attack scenarios. In addition, countermeasures that render the attacks impractical, although not totally eliminating their potential danger, are devised. Moreover, some new ideas that will be used in our future research work are proposed.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Hybrid model for information filtering in location based social networks using text mining Intrusion detection using error correcting output code based ensemble Human action recognition via multi-scale 3D stationary wavelet analysis Research of customer behavior anomalies in big financial data Intelligent road surface quality evaluation using rough mereology
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1