Security evaluation of the z-wave

Publish Year: 1400
نوع سند: مقاله کنفرانسی
زبان: English
View: 284

This Paper With 11 Page And PDF Format Ready To Download

  • Certificate
  • من نویسنده این مقاله هستم

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این Paper:

شناسه ملی سند علمی:

CECCONF14_008

تاریخ نمایه سازی: 5 بهمن 1400

Abstract:

In this article, we will examine the security of Z-Wave. The Z-Wave wireless communication protocol is widely used in home automation networks and wireless sensors. Z-Wave is based on a proprietary design and a single chip dealer. There has been some scientific and practical security research on home automation systems based on the ZigBee and X۱۰ protocols, however, no public vulnerability research has been found on Z-Wave before. This device enables us to decrypt the various layers of the Z-Wave protocol and examine how to perform encryption and authentication of the data source in the application layer. In a part of the text, we will get acquainted with the types of threats of this protocol and find out what parts Z-Wave consists of and compare it with other protocols. We will discuss the advantages of Z-Wave and check the security problems. A vulnerability was first discovered in an AES* encrypted ZWave door lock that can be remotely exploited to unlock a door without knowing the encryption key and since the key has changed, the following network messages, like in "open door", will be ignored by the established network controller. It reinforces encryption standards for transfers between nodes and imposes new pairing procedures for each device, with a unique PIN or QR code on each device.

Authors

Poriya Daliry

Department of Computer Engineering, Hakim Sabzevari University, Sabzevar, Iran