Title :
Improved tools for indoor ZigBee warwalking
Author :
Ramsey, Benjamin W. ; Mullins, Barry E. ; White, E.D.
Author_Institution :
Dept. of Electr. & Comput. Eng., Air Force Inst. of Technol., Wright-Patterson AFB, OH, USA
Abstract :
Secure ZigBee wireless sensor and control networks use 128-bit AES encryption to defend against message sniffing and unauthorized access. However, the low cost and low complexity of ZigBee devices makes them vulnerable to physical attacks such as tampering and network key extraction. Network administrators and penetration testers require tools such as Zbfind to accurately locate ZigBee hardware and evaluate physical security. The open source Zbfind tool estimates distance to ZigBee devices in real time using received signal strength and a distance prediction model. We collect 4500 signal strength measurements along nine walking paths toward ZigBee transmitters in three office buildings. We find that the log-distance path loss model used by Zbfind predicts transmitter distance with 92.5% mean absolute percentage error. We construct an alternative linear model that reduces error to 21%.
Keywords :
Zigbee; access protocols; office automation; radio transmitters; telecommunication security; wireless sensor networks; AES encryption; ZigBee device; ZigBee hardware security; ZigBee transmitter; Zigbee control network security; Zigbee wireless sensor network; distance prediction model; log distance path loss model; message sniffing; network administrator; network vulnerability; office buildings; open source Zbfind tool; penetration tester; physical security evaluation; received signal strength measurement; unauthorized access; Buildings; Estimation; Hardware; Transmitters; Wireless communication; Wireless sensor networks; Zigbee; ZigBee; security; wireless sensor networks;
Conference_Titel :
Local Computer Networks Workshops (LCN Workshops), 2012 IEEE 37th Conference on
Conference_Location :
Clearwater, FL
Print_ISBN :
978-1-4673-2130-3
DOI :
10.1109/LCNW.2012.6424083