2015 IEEE 2nd World Forum on Internet of Things (WF-IoT) 2015
DOI: 10.1109/wf-iot.2015.7389142
|View full text |Cite
|
Sign up to set email alerts
|

Preserving privacy in secured ZigBee wireless sensor networks

Abstract: HAL is a multidisciplinary open access archive for the deposit and dissemination of scientific research documents, whether they are published or not. The documents may come from teaching and research institutions in France or abroad, or from public or private research centers. L'archive ouverte pluridisciplinaire HAL, est destinée au dépôt et à la diffusion de documents scientifiques de niveau recherche, publiés ou non, émanant des établissements d'enseignement et de recherche français ou étrangers, des labora… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
6
3

Relationship

1
8

Authors

Journals

citations
Cited by 12 publications
(7 citation statements)
references
References 5 publications
0
7
0
Order By: Relevance
“…Metadata can in turn be extracted in order to discover the identities of participants (MAC addresses, IP addresses, UDP ports) and their roles, but also the characteristics of the network, allowing attackers to identify the communication protocols employed and thus to exploit their weaknesses. This is the case of ZigBee, which offers many vulnerabilities as regards eavesdropping [180]. The first privacy attack is eavesdropping, which is also an MITM attack [178].…”
Section: Privacy Issuesmentioning
confidence: 99%
“…Metadata can in turn be extracted in order to discover the identities of participants (MAC addresses, IP addresses, UDP ports) and their roles, but also the characteristics of the network, allowing attackers to identify the communication protocols employed and thus to exploit their weaknesses. This is the case of ZigBee, which offers many vulnerabilities as regards eavesdropping [180]. The first privacy attack is eavesdropping, which is also an MITM attack [178].…”
Section: Privacy Issuesmentioning
confidence: 99%
“…The parsed AST with symbols resolved (parsedSmblAST) is then input to the AnalyzeClass function (line 7) which recursively analyzes all related classes to identify the dependencies among variables. During the class analysis, each method which belongs to the class is analyzed by the AnalyzeMethods function, to find the domain-specific types, local actions and branch information (lines [26][27][28][29][30][31][32][33][34][35][36][37][38][39][40][41][42][43][44]. If a value Ev.v is equivalent to a variable with a known domain type (dT), HOMESCAN assigns the dT to the Ev.t (lines [16][17][18][19][20][21][22][23][24].…”
Section: Inference Of Protocol Informationmentioning
confidence: 99%
“…input, where ast is the parsed AST with resolved symbols; dTmap is a map of (node, domain type, related method); IK is the initial knowledge and returns an updated dTmap. The function analyzes each method node (methodNode) in the input ast (lines [28][29][30][31][32][33][34][35][36][37][38][39][40][41][42][43][44]. During the analysis, HOMESCAN gets the child nodes of methodNode, and further analyzes each child node n based on its expression (lines 30-42).…”
Section: Domain Type Annotation and Local Action Identification (Lines 26-45)mentioning
confidence: 99%
“…We have modified and designed algorithms pertaining to 3D cloaking and monitoring in our earlier paper [16]. Jessye and others [17] have worked for information leakage privacy protection in zigbee network based applications. F. Giselle and others [18] have demonstrated use of holomorphic encryption techniques for privacy which do not show the effect of 3 rd dimension of location.…”
Section: Related Workmentioning
confidence: 99%