Back to Search Start Over

Timestamp Scheme to Mitigate Replay Attacks in Secure ZigBee Networks.

Authors :
Farha, Fadi
Ning, Huansheng
Yang, Shunkun
Xu, Jiabo
Zhang, Weishan
Choo, Kim-Kwang Raymond
Source :
IEEE Transactions on Mobile Computing; Jan2022, Vol. 21 Issue 1, p342-351, 10p
Publication Year :
2022

Abstract

ZigBee is one of the communication protocols used in the Internet of Things (IoT) applications. In typical deployment scenarios involving low-cost and low-power IoT devices, many communication features are disabled, consequently affecting the security offered by ZigBee. The ZigBee specification assumes that deployment of frame counters is sufficient to mitigate replay attacks in secure ZigBee networks. However, we demonstrate that it is insufficient in this paper (i.e., the network is no longer secure after the coordinator restarts). As a countermeasure, we present a timestamp-based scheme to mitigate replay attacks. Our mitigation strategy does not consume power significantly, and fully powered devices will be responsible for providing power-constrained devices with the current timestamp. The proposed scheme is designed for all ZigBee topologies and different states of ZigBee End Devices (ZEDs). Findings from our evaluation show that the proposed scheme can successfully mitigate replay attacks, with no significant network performance degradation even assuming a worst-case scenario (i.e., many devices are sending data simultaneously). [ABSTRACT FROM AUTHOR]

Details

Language :
English
ISSN :
15361233
Volume :
21
Issue :
1
Database :
Complementary Index
Journal :
IEEE Transactions on Mobile Computing
Publication Type :
Academic Journal
Accession number :
153953491
Full Text :
https://doi.org/10.1109/TMC.2020.3006905