SlideShare a Scribd company logo
ZigBee IEEE 802.15.4
 What it is:
a high-level communication protocol for WSNs and WPANs
a M2M Area Network Technology for WLANs.
 Attributes:
Low power consumption, low-cost, low bitrate
mesh networking standard supports 10-1000 meter range
– highly reliable
stable against node failover
global standards for interoperability
 Applications:
Home Automation, Building Automation, Smart Energy, Health and
Fitness, 3D gaming, Telecommunications, Retail, Industrial Control.
 Security Architecture:
Access Control Frame address validation MAC Layer Frame Integrity, Trust Center Architecture for Secure
Network Admittance.
Authentication and
Data Confidentiality
Symmetric Key Encryption for
Frames
Confidentiality :AES-CTR
Authentication: AES-CBC-MAC with 32,-64,128bit MAC
Confidentiality & Authentication: AES -CCM with 32-,64-,128 bit MAC
Supports PKI.
Frame Integrity Protection against tampering for
data in transit
MIC 32/64/128 bits based on AES-CBC-MAC
Sequential Freshness Prevention of Replay Attacks 4-Byte Frame Counter
 Common security concerns:
Long battery life of at least 2 years is a must to pass ZigBee certification.
So resource-intensive security measures are avoided to keep power
consumption low and limited.
Interoperability among ZigBee profiles might force security slackening.
ZigBee-based devices are essentially low-cost, thus lacking protection
from physical attacks using serial interfaces such as GoodFet and BusPirate.
Golden Rules for Security in the Residential Mode
• Building blocks of ZigBee security: Key establishment, key
transport, frame protection and device management.
• Key management is all about secure initialization, installation,
processing and storage of Network Keys and Link Keys.
• End-to-end Data Security – Only a source and a destination
device can decrypt a message using a combination of keys.
• The APS and NWK layers can both independently process the
secure MAC frames with either encryption (confidentiality) or
authentication, or both.
• The ZigBee Device Object (ZDO) manages security policies and
security configuration for devices.
A real world assessment environment:
Testing a smart device model for lighting and temperature
control based on ZigBee Home Automation Profile
Development Kits: Xbee and Texas Instruments
ZigBee Coordinator (ZC/ZTC) – Xbee RF Module/CC2531 USB Dongle (0x0000)
ZigBee End Device (ZED) – Xbee RF Module/CC2530 development board (0x6EC7)
- set up as a monitoring node, fitted with:
temperature sensor, LED and LDR for light sensing/emission
and light intensity measurement.
ZigBee Router (ZR) – Xbee RF Module/CC2530 development
board (0xCEBC)
In the lab…
ZigBee Logical Device Types and Functions
ZigBee Coordinator (FFD, parent)
• starts the network, maintains neighbor and router lists.
• acts as Trust Center for secure node joining (authenticates new joiner).
• PAN Coordinator functions for network and security management.
• can update link key and network key periodically.
• transfers application packets.
ZigBee Router (FFD)
• Allows devices to join the network
• Multi-hop communication
ZigBee End Devices (RFD or FFD, child)
• battery-powered radios with short duty-cycles.
• sensor nodes for data sampling.
• can be routed using a ZigBee gateway.
• transfers application packets.
Node Types
RFD – Reduced Function Device
FFD – Full Function Device
ZigBee deployment flaws
in Residential Mode
Attack Vector Analysis
Assessing insecure implementation risks
1. EAVESDROPPING FOR NETWORK DISCOVERY & DEVICE IDENTIFICATION
Legitimate Beacon Request Frame (0x07)
Unencrypted Beacon
Response Frame
[PAN ID, source address,
stack profile, stack
version, and IEEE address]
SNIFFED
SENSOR NODE
Spoofed Beacon Request Frame
EXPLOIT DEVICE
Network discovery: Sniffing of the Unencrypted MAC Header to identify configuration, node addresses,
stack profile and PAN IDs from Beacon Responses sent to end devices by Coordinators and Routers.
Packet
Capture
COORDINATOR
Replay of the captured LED
ON/OFF packets excluding
ACK frame on the channel.
Delay of 1/10th of a second
between each frame.
2. REPLAY ATTACK – OFFLINE MODE
The Frame Counter in the NWK layer drops replayed packets.
But the MAC layer is vulnerable to replay of MAC command frames as the layer cannot
process an incoming frame counter.
EXPLOIT DEVICE
SENSOR NODE
COORDINATOR
CAPTURED
Injecting a spoofed beacon
request frame on a loop
with a 1-sec delay
3. DENIAL OF SERVICE
(A). PACKET INJECTION IN REAL-TIME
Effecting short-term unavailability of the coordinator’s services for a legitimate device
by causing bandwidth consumption and node energy draining.
EXPLOIT DEVICE
Continuous packet
injection to expend
bandwidth.
Node energy drain due to
extended ‘wake’ state
caused by its
retransmission loop in
anticipation of response.
ZC does not respond to
legitimate requests
from network nodes.
COORDINATOR
EXPLOIT DEVICE
3. ASSOCIATION FLOOD IN REAL-TIME
Injecting a forged
combination of association
request and data request
on a loop with a 1-sec delay
Disengaging a legitimate device and preventing rejoin using a syn flood attack. Some
vendors defend against this using device identity tables to detect suspicious behavior.
Continuous stream of
Association Responses Association table
overflows, expending
processing memory.
Coordinator’s
Communication with
legitimate nodes is
obstructed.
COORDINATOR
Nodes struggle to keep up with rapid PAN ID
rotation process which is triggered repetitively.
After a few seconds, communication
disintegrates.
Coordinator senses PAN ID Conflict and
realigns network to a new PAN ID for
every conflicting PAN ID replayed.
COORDINATOR
Continuous broadcast replay of
forged association responses on
the channel; impersonating the
PAN Coordinator.
Continuous sniffing of the network
to collect PAN IDs, extended PAN
IDs and channel.
EXPLOIT DEVICE 2
4. PAN ID CONFLICT ATTACK
Sabotaging the PAN Coordinator’s network management by means of manipulation
which is in essence, the initiation of a persistent conflict of PAN IDs.
EXPLOIT DEVICE 1
0x94ac
0x8b43
0x6335
0x72bc
OTA key provisioning vs. Pre-configured Keys
Network key is delivered in plaintext to end device
- higher susceptibility to key sniffing.
Keys are pre-installed by vendor in manufacture
- unless keys are updated, knowledge of the default keys of the
vendor can be used to make an illegitimate node (of the same
vendor) join the network.
- physical attacks often attempted.
Key rotation process is supported. Key rotation / revocation is not possible.
All data is initially encrypted with network key until link keys
are derived.
After device pairing, all data is encrypted with pre-installed link
key.
Widely preferred for large scale deployments for ease of set up
since employees need not handle activation procedures.
Small deployments in home automation are more likely to use
this method of key provisioning.
• Trust Center in the Residential Mode or Standard Security Mode maintains only the standard network keys.
We deem it necessary for deployers to equip the TC host with enough resources to maintain a list of nodes and
network policies to incorporate the resilience features of the High Security Mode to the extent possible while
maintaining the low-cost factor.
• The OTA key provisioning mechanism must be bolstered by other security measures to reduce key sniffing/reuse
vulnerabilities.
• Optimally leverage the AES-based security framework and Trust Center controls to harden the network ecosystem.
Nonce Reuse
• Sequential message numbers (nonces) can help detect and prevent replay attacks.
• Nonces must always be distinct although the security key is same for two messages.
• Attackers can spoof messages by copying the same nonce used by a previous message.
Save nonces in NVRAM so that status is preserved after a power failure.
Security at the MAC Layer
• MAC Layer only secures its own frames between neighboring nodes (no end-to-end protection as in APS layer)
• ACL-based node admission and Unsecured Mode are unreliable.
MIC must be used to validate frame check sum and message sequence.
Preventing Physical Attacks
• Debuggers and key sniffers are used to extract encryption keys from firmware on any node.
• Existing key is usually not invalidated once a node is removed from the network
– this eases rogue entry into network.
Tamper-proofing nodes and Out-of-band key loading via serial ports helps eliminate exposure to sniffing.
Best Practices
Node Revival
• Association/Syn Floods and PAN ID Conflict Attacks aim at disengaging nodes and disrupting
coordinator responses.
• Disconnected nodes are not immediately discernible.
Set Node Join Time parameter to ’Always’.

More Related Content

What's hot

Wireless Device and Network level security
Wireless Device and Network level securityWireless Device and Network level security
Wireless Device and Network level security
Chetan Kumar S
 
Wi fi protected-access
Wi fi protected-accessWi fi protected-access
Wi fi protected-access
bhanu4ugood1
 
Securing wireless network
Securing wireless networkSecuring wireless network
Securing wireless network
Syed Ubaid Ali Jafri
 
Wireless Security null seminar
Wireless Security null seminarWireless Security null seminar
Wireless Security null seminar
Nilesh Sapariya
 
WEP
WEPWEP
Hacking Wireless Networks : Null Delhi (November)
Hacking Wireless Networks : Null Delhi (November)Hacking Wireless Networks : Null Delhi (November)
Hacking Wireless Networks : Null Delhi (November)
Mandeep Jadon
 
Wireless network security
Wireless network securityWireless network security
Wireless network security
Vishal Agarwal
 
802.11 Wireless, WEP, WPA lecture
802.11 Wireless, WEP, WPA lecture802.11 Wireless, WEP, WPA lecture
802.11 Wireless, WEP, WPA lecture
Martyn Price
 
WPA 3
WPA 3WPA 3
WPA 3
diggu22
 
Wireless network security
Wireless network securityWireless network security
Wireless network security
Shahid Beheshti University
 
Wireless Network Security
Wireless Network SecurityWireless Network Security
Wireless Network Security
Gyana Ranjana
 
Super Barcode Training Camp - Motorola AirDefense Wireless Security Presentation
Super Barcode Training Camp - Motorola AirDefense Wireless Security PresentationSuper Barcode Training Camp - Motorola AirDefense Wireless Security Presentation
Super Barcode Training Camp - Motorola AirDefense Wireless Security Presentation
System ID Warehouse
 
Hacking Wireless Networks by Mandeep Singh Jadon
Hacking Wireless Networks by Mandeep Singh JadonHacking Wireless Networks by Mandeep Singh Jadon
Hacking Wireless Networks by Mandeep Singh Jadon
OWASP Delhi
 
Cracking wep and wpa wireless networks
Cracking wep and wpa wireless networksCracking wep and wpa wireless networks
Cracking wep and wpa wireless networks
Maghan Das
 
Wireless hacking
Wireless hackingWireless hacking
Wireless hacking
arushi bhatnagar
 
Wireless Security
Wireless SecurityWireless Security
謝續平
謝續平謝續平
謝續平9577601
 
Wireless Network Security
Wireless Network SecurityWireless Network Security
Wireless Network Security
kentquirk
 
WIFI Hacking
WIFI HackingWIFI Hacking
WIFI Hacking
Suraj Bohara
 

What's hot (20)

Wireless Device and Network level security
Wireless Device and Network level securityWireless Device and Network level security
Wireless Device and Network level security
 
Wi fi protected-access
Wi fi protected-accessWi fi protected-access
Wi fi protected-access
 
Securing wireless network
Securing wireless networkSecuring wireless network
Securing wireless network
 
Wireless Security null seminar
Wireless Security null seminarWireless Security null seminar
Wireless Security null seminar
 
WPA2
WPA2WPA2
WPA2
 
WEP
WEPWEP
WEP
 
Hacking Wireless Networks : Null Delhi (November)
Hacking Wireless Networks : Null Delhi (November)Hacking Wireless Networks : Null Delhi (November)
Hacking Wireless Networks : Null Delhi (November)
 
Wireless network security
Wireless network securityWireless network security
Wireless network security
 
802.11 Wireless, WEP, WPA lecture
802.11 Wireless, WEP, WPA lecture802.11 Wireless, WEP, WPA lecture
802.11 Wireless, WEP, WPA lecture
 
WPA 3
WPA 3WPA 3
WPA 3
 
Wireless network security
Wireless network securityWireless network security
Wireless network security
 
Wireless Network Security
Wireless Network SecurityWireless Network Security
Wireless Network Security
 
Super Barcode Training Camp - Motorola AirDefense Wireless Security Presentation
Super Barcode Training Camp - Motorola AirDefense Wireless Security PresentationSuper Barcode Training Camp - Motorola AirDefense Wireless Security Presentation
Super Barcode Training Camp - Motorola AirDefense Wireless Security Presentation
 
Hacking Wireless Networks by Mandeep Singh Jadon
Hacking Wireless Networks by Mandeep Singh JadonHacking Wireless Networks by Mandeep Singh Jadon
Hacking Wireless Networks by Mandeep Singh Jadon
 
Cracking wep and wpa wireless networks
Cracking wep and wpa wireless networksCracking wep and wpa wireless networks
Cracking wep and wpa wireless networks
 
Wireless hacking
Wireless hackingWireless hacking
Wireless hacking
 
Wireless Security
Wireless SecurityWireless Security
Wireless Security
 
謝續平
謝續平謝續平
謝續平
 
Wireless Network Security
Wireless Network SecurityWireless Network Security
Wireless Network Security
 
WIFI Hacking
WIFI HackingWIFI Hacking
WIFI Hacking
 

Similar to Resilience in the ZigBee Residential Mode

Majorppt
MajorpptMajorppt
Majorppt
vik001ind
 
4 wifi security
4 wifi security4 wifi security
4 wifi securityal-sari7
 
Wireless hacking septafiansyah
Wireless hacking   septafiansyahWireless hacking   septafiansyah
Wireless hacking septafiansyahSeptafiansyah P
 
WLAN SECURITY BY SAIKIRAN PANJALA
WLAN SECURITY BY SAIKIRAN PANJALAWLAN SECURITY BY SAIKIRAN PANJALA
WLAN SECURITY BY SAIKIRAN PANJALA
Saikiran Panjala
 
Understanding IT Network Security for Wireless and Wired Measurement Applicat...
Understanding IT Network Security for Wireless and Wired Measurement Applicat...Understanding IT Network Security for Wireless and Wired Measurement Applicat...
Understanding IT Network Security for Wireless and Wired Measurement Applicat...
cmstiernberg
 
Network Security- Basics Knowledge in wireless Security
Network Security- Basics Knowledge in wireless SecurityNetwork Security- Basics Knowledge in wireless Security
Network Security- Basics Knowledge in wireless Security
SUBHAK25
 
Sheetal - Wirelesss Hacking - ClubHack2008
Sheetal - Wirelesss Hacking - ClubHack2008Sheetal - Wirelesss Hacking - ClubHack2008
Sheetal - Wirelesss Hacking - ClubHack2008ClubHack
 
Exploiting WiFi Security
Exploiting WiFi Security Exploiting WiFi Security
Exploiting WiFi Security
Hariraj Rathod
 
Security Issues of IEEE 802.11b
Security Issues of IEEE 802.11bSecurity Issues of IEEE 802.11b
Security Issues of IEEE 802.11b
Sreekanth GS
 
Security Issues of 802.11b
Security Issues of 802.11bSecurity Issues of 802.11b
Security Issues of 802.11b
guestd7b627
 
Security in wireless sensor network
Security in wireless sensor networkSecurity in wireless sensor network
Security in wireless sensor network
Adit Pathak
 
WPA3 - What is it good for?
WPA3 - What is it good for?WPA3 - What is it good for?
WPA3 - What is it good for?
Tom Isaacson
 
Wireless lan security(10.8)
Wireless lan security(10.8)Wireless lan security(10.8)
Wireless lan security(10.8)
SubashiniRathinavel
 
Ccna (200 125)
Ccna (200 125)Ccna (200 125)
Ccna (200 125)
shajeeha khalid
 
CCNA(R&S) By Ezxprt
CCNA(R&S) By EzxprtCCNA(R&S) By Ezxprt
CCNA(R&S) By Ezxprt
Ezxprt
 
Megaplex nerc-cip-compliance
Megaplex nerc-cip-complianceMegaplex nerc-cip-compliance
Megaplex nerc-cip-compliance
Nir Cohen
 
Wi fi security
Wi fi securityWi fi security
Wi fi security
Virendra Thakur
 
Understanding senetas layer 2 encryption
Understanding senetas layer 2 encryptionUnderstanding senetas layer 2 encryption
Understanding senetas layer 2 encryption
Senetas
 
Banking and ATM networking reports
Banking and ATM networking reportsBanking and ATM networking reports
Banking and ATM networking reports
Shakib Ansaar
 

Similar to Resilience in the ZigBee Residential Mode (20)

Majorppt
MajorpptMajorppt
Majorppt
 
4 wifi security
4 wifi security4 wifi security
4 wifi security
 
Shashank wireless lans security
Shashank wireless lans securityShashank wireless lans security
Shashank wireless lans security
 
Wireless hacking septafiansyah
Wireless hacking   septafiansyahWireless hacking   septafiansyah
Wireless hacking septafiansyah
 
WLAN SECURITY BY SAIKIRAN PANJALA
WLAN SECURITY BY SAIKIRAN PANJALAWLAN SECURITY BY SAIKIRAN PANJALA
WLAN SECURITY BY SAIKIRAN PANJALA
 
Understanding IT Network Security for Wireless and Wired Measurement Applicat...
Understanding IT Network Security for Wireless and Wired Measurement Applicat...Understanding IT Network Security for Wireless and Wired Measurement Applicat...
Understanding IT Network Security for Wireless and Wired Measurement Applicat...
 
Network Security- Basics Knowledge in wireless Security
Network Security- Basics Knowledge in wireless SecurityNetwork Security- Basics Knowledge in wireless Security
Network Security- Basics Knowledge in wireless Security
 
Sheetal - Wirelesss Hacking - ClubHack2008
Sheetal - Wirelesss Hacking - ClubHack2008Sheetal - Wirelesss Hacking - ClubHack2008
Sheetal - Wirelesss Hacking - ClubHack2008
 
Exploiting WiFi Security
Exploiting WiFi Security Exploiting WiFi Security
Exploiting WiFi Security
 
Security Issues of IEEE 802.11b
Security Issues of IEEE 802.11bSecurity Issues of IEEE 802.11b
Security Issues of IEEE 802.11b
 
Security Issues of 802.11b
Security Issues of 802.11bSecurity Issues of 802.11b
Security Issues of 802.11b
 
Security in wireless sensor network
Security in wireless sensor networkSecurity in wireless sensor network
Security in wireless sensor network
 
WPA3 - What is it good for?
WPA3 - What is it good for?WPA3 - What is it good for?
WPA3 - What is it good for?
 
Wireless lan security(10.8)
Wireless lan security(10.8)Wireless lan security(10.8)
Wireless lan security(10.8)
 
Ccna (200 125)
Ccna (200 125)Ccna (200 125)
Ccna (200 125)
 
CCNA(R&S) By Ezxprt
CCNA(R&S) By EzxprtCCNA(R&S) By Ezxprt
CCNA(R&S) By Ezxprt
 
Megaplex nerc-cip-compliance
Megaplex nerc-cip-complianceMegaplex nerc-cip-compliance
Megaplex nerc-cip-compliance
 
Wi fi security
Wi fi securityWi fi security
Wi fi security
 
Understanding senetas layer 2 encryption
Understanding senetas layer 2 encryptionUnderstanding senetas layer 2 encryption
Understanding senetas layer 2 encryption
 
Banking and ATM networking reports
Banking and ATM networking reportsBanking and ATM networking reports
Banking and ATM networking reports
 

Recently uploaded

Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 

Recently uploaded (20)

Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 

Resilience in the ZigBee Residential Mode

  • 1. ZigBee IEEE 802.15.4  What it is: a high-level communication protocol for WSNs and WPANs a M2M Area Network Technology for WLANs.  Attributes: Low power consumption, low-cost, low bitrate mesh networking standard supports 10-1000 meter range – highly reliable stable against node failover global standards for interoperability  Applications: Home Automation, Building Automation, Smart Energy, Health and Fitness, 3D gaming, Telecommunications, Retail, Industrial Control.
  • 2.  Security Architecture: Access Control Frame address validation MAC Layer Frame Integrity, Trust Center Architecture for Secure Network Admittance. Authentication and Data Confidentiality Symmetric Key Encryption for Frames Confidentiality :AES-CTR Authentication: AES-CBC-MAC with 32,-64,128bit MAC Confidentiality & Authentication: AES -CCM with 32-,64-,128 bit MAC Supports PKI. Frame Integrity Protection against tampering for data in transit MIC 32/64/128 bits based on AES-CBC-MAC Sequential Freshness Prevention of Replay Attacks 4-Byte Frame Counter  Common security concerns: Long battery life of at least 2 years is a must to pass ZigBee certification. So resource-intensive security measures are avoided to keep power consumption low and limited. Interoperability among ZigBee profiles might force security slackening. ZigBee-based devices are essentially low-cost, thus lacking protection from physical attacks using serial interfaces such as GoodFet and BusPirate.
  • 3. Golden Rules for Security in the Residential Mode • Building blocks of ZigBee security: Key establishment, key transport, frame protection and device management. • Key management is all about secure initialization, installation, processing and storage of Network Keys and Link Keys. • End-to-end Data Security – Only a source and a destination device can decrypt a message using a combination of keys. • The APS and NWK layers can both independently process the secure MAC frames with either encryption (confidentiality) or authentication, or both. • The ZigBee Device Object (ZDO) manages security policies and security configuration for devices.
  • 4. A real world assessment environment: Testing a smart device model for lighting and temperature control based on ZigBee Home Automation Profile Development Kits: Xbee and Texas Instruments ZigBee Coordinator (ZC/ZTC) – Xbee RF Module/CC2531 USB Dongle (0x0000) ZigBee End Device (ZED) – Xbee RF Module/CC2530 development board (0x6EC7) - set up as a monitoring node, fitted with: temperature sensor, LED and LDR for light sensing/emission and light intensity measurement. ZigBee Router (ZR) – Xbee RF Module/CC2530 development board (0xCEBC) In the lab…
  • 5. ZigBee Logical Device Types and Functions ZigBee Coordinator (FFD, parent) • starts the network, maintains neighbor and router lists. • acts as Trust Center for secure node joining (authenticates new joiner). • PAN Coordinator functions for network and security management. • can update link key and network key periodically. • transfers application packets. ZigBee Router (FFD) • Allows devices to join the network • Multi-hop communication ZigBee End Devices (RFD or FFD, child) • battery-powered radios with short duty-cycles. • sensor nodes for data sampling. • can be routed using a ZigBee gateway. • transfers application packets. Node Types RFD – Reduced Function Device FFD – Full Function Device
  • 6. ZigBee deployment flaws in Residential Mode Attack Vector Analysis Assessing insecure implementation risks
  • 7. 1. EAVESDROPPING FOR NETWORK DISCOVERY & DEVICE IDENTIFICATION Legitimate Beacon Request Frame (0x07) Unencrypted Beacon Response Frame [PAN ID, source address, stack profile, stack version, and IEEE address] SNIFFED SENSOR NODE Spoofed Beacon Request Frame EXPLOIT DEVICE Network discovery: Sniffing of the Unencrypted MAC Header to identify configuration, node addresses, stack profile and PAN IDs from Beacon Responses sent to end devices by Coordinators and Routers. Packet Capture COORDINATOR
  • 8. Replay of the captured LED ON/OFF packets excluding ACK frame on the channel. Delay of 1/10th of a second between each frame. 2. REPLAY ATTACK – OFFLINE MODE The Frame Counter in the NWK layer drops replayed packets. But the MAC layer is vulnerable to replay of MAC command frames as the layer cannot process an incoming frame counter. EXPLOIT DEVICE SENSOR NODE COORDINATOR CAPTURED
  • 9. Injecting a spoofed beacon request frame on a loop with a 1-sec delay 3. DENIAL OF SERVICE (A). PACKET INJECTION IN REAL-TIME Effecting short-term unavailability of the coordinator’s services for a legitimate device by causing bandwidth consumption and node energy draining. EXPLOIT DEVICE Continuous packet injection to expend bandwidth. Node energy drain due to extended ‘wake’ state caused by its retransmission loop in anticipation of response. ZC does not respond to legitimate requests from network nodes. COORDINATOR
  • 10. EXPLOIT DEVICE 3. ASSOCIATION FLOOD IN REAL-TIME Injecting a forged combination of association request and data request on a loop with a 1-sec delay Disengaging a legitimate device and preventing rejoin using a syn flood attack. Some vendors defend against this using device identity tables to detect suspicious behavior. Continuous stream of Association Responses Association table overflows, expending processing memory. Coordinator’s Communication with legitimate nodes is obstructed. COORDINATOR
  • 11. Nodes struggle to keep up with rapid PAN ID rotation process which is triggered repetitively. After a few seconds, communication disintegrates. Coordinator senses PAN ID Conflict and realigns network to a new PAN ID for every conflicting PAN ID replayed. COORDINATOR Continuous broadcast replay of forged association responses on the channel; impersonating the PAN Coordinator. Continuous sniffing of the network to collect PAN IDs, extended PAN IDs and channel. EXPLOIT DEVICE 2 4. PAN ID CONFLICT ATTACK Sabotaging the PAN Coordinator’s network management by means of manipulation which is in essence, the initiation of a persistent conflict of PAN IDs. EXPLOIT DEVICE 1 0x94ac 0x8b43 0x6335 0x72bc
  • 12. OTA key provisioning vs. Pre-configured Keys Network key is delivered in plaintext to end device - higher susceptibility to key sniffing. Keys are pre-installed by vendor in manufacture - unless keys are updated, knowledge of the default keys of the vendor can be used to make an illegitimate node (of the same vendor) join the network. - physical attacks often attempted. Key rotation process is supported. Key rotation / revocation is not possible. All data is initially encrypted with network key until link keys are derived. After device pairing, all data is encrypted with pre-installed link key. Widely preferred for large scale deployments for ease of set up since employees need not handle activation procedures. Small deployments in home automation are more likely to use this method of key provisioning. • Trust Center in the Residential Mode or Standard Security Mode maintains only the standard network keys. We deem it necessary for deployers to equip the TC host with enough resources to maintain a list of nodes and network policies to incorporate the resilience features of the High Security Mode to the extent possible while maintaining the low-cost factor. • The OTA key provisioning mechanism must be bolstered by other security measures to reduce key sniffing/reuse vulnerabilities. • Optimally leverage the AES-based security framework and Trust Center controls to harden the network ecosystem.
  • 13. Nonce Reuse • Sequential message numbers (nonces) can help detect and prevent replay attacks. • Nonces must always be distinct although the security key is same for two messages. • Attackers can spoof messages by copying the same nonce used by a previous message. Save nonces in NVRAM so that status is preserved after a power failure. Security at the MAC Layer • MAC Layer only secures its own frames between neighboring nodes (no end-to-end protection as in APS layer) • ACL-based node admission and Unsecured Mode are unreliable. MIC must be used to validate frame check sum and message sequence. Preventing Physical Attacks • Debuggers and key sniffers are used to extract encryption keys from firmware on any node. • Existing key is usually not invalidated once a node is removed from the network – this eases rogue entry into network. Tamper-proofing nodes and Out-of-band key loading via serial ports helps eliminate exposure to sniffing. Best Practices Node Revival • Association/Syn Floods and PAN ID Conflict Attacks aim at disengaging nodes and disrupting coordinator responses. • Disconnected nodes are not immediately discernible. Set Node Join Time parameter to ’Always’.