What’s your protocol: Vulnerabilities and security threats related to Z-Wave protocol
Autor: | Huy Kang Kim, Min Seok Sung, Young Ho Jung, Seong Beom Kim, Kyounggon Kim, Jihwan Lim, Kiyoon Cho |
---|---|
Rok vydání: | 2020 |
Předmět: |
Computer Networks and Communications
business.industry Computer science Mobile computing 020206 networking & telecommunications 02 engineering and technology Computer security computer.software_genre Z-Wave Computer Science Applications Data flow diagram Hardware and Architecture Home automation Smart city Threat model 0202 electrical engineering electronic engineering information engineering 020201 artificial intelligence & image processing business computer Wireless sensor network Protocol (object-oriented programming) Software Information Systems |
Zdroj: | Pervasive and Mobile Computing. 66:101211 |
ISSN: | 1574-1192 |
DOI: | 10.1016/j.pmcj.2020.101211 |
Popis: | With the evolution of state-of-the-art applications and paradigms, the world is progressing toward smart cities. Smart homes are an important aspect of smart cities, wherein various mobile computing and network technologies are used. However, they are also susceptible to security threats that can cause serious issues related to privacy and safety. Z-Wave is a wireless technology primarily used in smart homes; however, its protocol has not been sufficiently investigated. In this study, we examined threat modeling for the Z-Wave protocol to determine the security issues and suggested attack scenarios in which we gained full control over the commercial products that implement Z-Wave. We analyzed the level 2 data flow diagram of actual products. The experimental results revealed that the major products that implement Z-Wave have several vulnerabilities. A video demonstrating our experimental result can be found at https://youtu.be/sM-NlJexDPU . |
Databáze: | OpenAIRE |
Externí odkaz: |