Judging the Relevance and worth of ideas part 2.pptx
Zigbee
1. A Overview Of Zigbee
Wireless Sensor
Network
Presented by :
Neha Gupta
Assistant Professor
2. Introduction
W
Zigbee
Data rates of
20 kbps and
up to 250 kbps
10 to 75 m
coverage
range
Multi-level
security
Three bands,
27 channels
specified
Up to 2 years
of battery life
Can be
invisible
e
8. Attacks On Zigbee
ZigBee End-Device Sabotage Attack- default polling
rate (100 ms) and the power leakage during each wake-
up, the attacker can cause power failures to ZigBee
sensors, Can be used to attack ZigBee-enabled house
door locks, windows, car door locks, and motion
sensors.
ZigBee Network Key Sniffing Attack- it is basically a
parser that searches for the Application Support
Sublayer key transport command frames from the
captured data and finds the network key.
Replay Attack-an attacker can intercept network traffic
and re-transmit it as if the original sender is sending the
data again.
9. Interception of Packets Attack-eavesdrop on
ZigBee network traffic and abuse the intercepted
message for malicious purposes.
Network Discovery and Device Identification
Attack
10. Countermeasures
ATTACK SOLUTION
Against ZigBee End-Device
Sabotage attack
use a remote alerting system for
warning about power failures of
ZigBee devices.
Against ZigBee Network Key
Sniffing attack
use the High Security level in
safety-critical ZigBee-enabled
systems
Against Network Discovery and
Device Identification attack
use of intrusion detection and
prevention system
Against Interception of Packets
attack
High Security level in safety-
critical ZigBee-enabled systems
Against Replay attack timestamping mechanism
integrated into the encryption
process of ZigBee