Reverse Engineering in Zigbee devices
Publish place: The 2nd International Conference on Architecture, Civil Engineering, Agriculture and the Environment
Publish Year: 1398
Type: Conference paper
Language: English
View: 436
متن کامل این Paper منتشر نشده است و فقط به صورت چکیده یا چکیده مبسوط در پایگاه موجود می باشد.
توضیح: معمولا کلیه مقالاتی که کمتر از ۵ صفحه باشند در پایگاه سیویلیکا اصل Paper (فول تکست) محسوب نمی شوند و فقط کاربران عضو بدون کسر اعتبار می توانند فایل آنها را دانلود نمایند.
- Certificate
- I'm the author of the paper
Export:
Document National Code:
ACAECONF02_054
Index date: 20 July 2019
Reverse Engineering in Zigbee devices abstract
Wireless sensors will soon be part of many industrial, military, and home networks. Of the various networking protocols, which include Zigbee, ISA100, Wireless HART, 6LowPAN, and others, none has yet become a definitive standard. Neither have vendors standardized upon a given operating system, compiler, or microcontroller. Users of these sensor networks are often given no command-line, no internal documentation, and no access to the internals of each device. This paper provides a thorough introduction to reverse engineering such devices, both in hardware and in software.
Reverse Engineering in Zigbee devices Keywords:
Reverse Engineering in Zigbee devices authors
Saeed Hasanzadeh asl
University of Tabriz
Maryam Alizadeh
University of Tabriz