2020 IEEE International Conference on Embedded Software and Systems (ICESS) 2020
DOI: 10.1109/icess49830.2020.9301593
|View full text |Cite
|
Sign up to set email alerts
|

New Replay Attacks on ZigBee Devices for Internet-of-Things (IoT) Applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 14 publications
(1 citation statement)
references
References 6 publications
0
1
0
Order By: Relevance
“…If an attacker is able to obtain the key information for another device, the attacker can exploit this vulnerability and break into the Zigbee network. In addition, a "replay attack" against Zigbee has already been reported [14]. In a replay attack, the attacker eavesdrops on the network's communication, intercepts it, and then resends it to misdirect the receiver into doing what the attacker wants.…”
Section: Securitymentioning
confidence: 99%
“…If an attacker is able to obtain the key information for another device, the attacker can exploit this vulnerability and break into the Zigbee network. In addition, a "replay attack" against Zigbee has already been reported [14]. In a replay attack, the attacker eavesdrops on the network's communication, intercepts it, and then resends it to misdirect the receiver into doing what the attacker wants.…”
Section: Securitymentioning
confidence: 99%