Mitigating replay attacks with ZigBee solutions

The ZigBee wireless technology was developed by the ZigBee alliance and is a low-cost communication solution with low power consumption. 1 , 2 ZigBee applications are often embedded into electrical circuits that are widely used in home and building automation, PC peripherals and medical sensors. 3 , 4

[1]  Maoheng Sun,et al.  Study and Application of Security Based on ZigBee Standard , 2011, 2011 Third International Conference on Multimedia Information Networking and Security.

[2]  Yu-Wei Su,et al.  A Comparative Study of Wireless Protocols: Bluetooth, UWB, ZigBee, and Wi-Fi , 2007, IECON 2007 - 33rd Annual Conference of the IEEE Industrial Electronics Society.

[3]  Xiaofeng Xue,et al.  Application and Analysis of ZigBee Security Services Specification , 2010, 2010 Second International Conference on Networks Security, Wireless Communications and Trusted Computing.

[4]  Pekka Toivanen,et al.  Security Threats in ZigBee-Enabled Systems: Vulnerability Evaluation, Practical Experiments, Countermeasures, and Lessons Learned , 2013, 2013 46th Hawaii International Conference on System Sciences.

[5]  Uttam Ghosh,et al.  Considering security for ZigBee protocol using message authentication code , 2015, 2015 Annual IEEE India Conference (INDICON).

[6]  S. Sitharama Iyengar,et al.  Fundamentals of Sensor Network Programming: Applications and Technology , 2010 .

[7]  Bin Yang,et al.  Study on Security of Wireless Sensor Network Based on ZigBee Standard , 2009, 2009 International Conference on Computational Intelligence and Security.

[8]  Abdul-Rahman Al-Ali,et al.  InfoPods: Zigbee-based remote information monitoring devices for smart-homes , 2009, IEEE Transactions on Consumer Electronics.

[9]  Keijo Haataja,et al.  Three practical attacks against ZigBee security: Attack scenario definitions, practical experiments, countermeasures, and lessons learned , 2014, 2014 14th International Conference on Hybrid Intelligent Systems.

[10]  Drew Gislason,et al.  Zigbee Wireless Networking , 2008 .

[11]  Li Chunqing,et al.  Research of ZigBee's Data Security and Protection , 2009, 2009 International Forum on Computer Science-Technology and Applications.

[12]  Johnny Cache,et al.  Hacking Exposed Wireless: Wireless Security Secrets & Solutions , 2007 .

[13]  Cristina Alcaraz,et al.  A Security Analysis for Wireless Sensor Mesh Networks in Highly Critical Systems , 2010, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).

[14]  Mihui Kim,et al.  An enhanced key management using ZigBee Pro for wireless sensor networks , 2012, The International Conference on Information Network 2012.