Proceedings of the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks 2020
DOI: 10.1145/3395351.3399363
|View full text |Cite
|
Sign up to set email alerts
|

Zigator

Abstract: As the popularity of Internet-connected devices for residential use increases, it is important to ensure that they meet appropriate security goals, given that they interact with the physical world through sensors and actuators. Zigbee is a wireless communication protocol that is commonly used in smart home environments, which builds on top of the IEEE 802.15.4 standard. In this work we present a security analysis tool, called Zigator, that enables in-depth study of Zigbee networks. In particular, we study the … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
4
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 25 publications
(12 citation statements)
references
References 16 publications
1
4
0
Order By: Relevance
“…The experiments were performed in two scenarios: an isolated RF shield and a living IoT lab at Northeastern University, USA [18] (a typical real-world deployment with multiple IoT and non-IoT networks operating simultaneously). Furthermore, we validated our findings on public third-party capture files available on Crawdad [19] and wireshark [20]. Our results indicate over 90.6% accuracy in inferring functionality specific APL commands and 85% accuracy in determining event and device information using these inferred APL commands.…”
Section: Introductionsupporting
confidence: 54%
See 4 more Smart Citations
“…The experiments were performed in two scenarios: an isolated RF shield and a living IoT lab at Northeastern University, USA [18] (a typical real-world deployment with multiple IoT and non-IoT networks operating simultaneously). Furthermore, we validated our findings on public third-party capture files available on Crawdad [19] and wireshark [20]. Our results indicate over 90.6% accuracy in inferring functionality specific APL commands and 85% accuracy in determining event and device information using these inferred APL commands.…”
Section: Introductionsupporting
confidence: 54%
“…Table 6 reports the identification score as well as the number of devices and events identified in each capture file. In Capture 1 [19], we observed 6 known and 2 unknown devices. For the two unknown devices, we could not distinguish between a bulb and an outlet primarily because the capture file covered events leading to selective jamming attack and was not long enough to include periodic updates.…”
Section: Open World Evaluation On Public Capturesmentioning
confidence: 97%
See 3 more Smart Citations