A Security Evaluation of Popular Internet of Things Protocols for Manufacturers

被引:0
作者
Celebucki, Daniel [1 ]
Lin, Maj Alan [1 ]
Graham, Scott [1 ]
机构
[1] Air Force Inst Technol, Dept Elect & Comp Engn, Wright Patterson AFB, OH 45433 USA
来源
2018 IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS (ICCE) | 2018年
关键词
security; Internet of Things; wireless; protocols; BLUETOOTH LOW-ENERGY;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The Internet of Things (IoT) continues to increase in popularity as more "smart" devices are released and sold every year. Three protocols in particular, Zigbee, Z-wave, and Bluetooth Low Energy (BLE) are used for network communication on a significant number of IoT devices. However, devices utilizing each of these three protocols have been compromised due to either implementation failures by the manufacturer or security shortcomings in the protocol itself. This paper identifies the security features and shortcomings of each protocol citing employed attacks for reference. Additionally, it will serve to help manufacturers make two decisions: First, should they invest in creating their own protocol, and second, if they decide against this, which protocol should they use and how should they implement it to ensure their product is as secure as it can be. These answers are made with respect to the specific factors manufacturers in the IoT space face such as the reversed CIA model with availability usually being the most important of the three and the ease of use versus security tradeoff that manufacturers have to consider. This paper finishes with a section aimed at future research for IoT communication protocols.
引用
收藏
页数:6
相关论文
共 28 条
[1]  
Agosta G., CYBER SECURITY ANAL
[2]   Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications [J].
Al-Fuqaha, Ala ;
Guizani, Mohsen ;
Mohammadi, Mehdi ;
Aledhari, Mohammed ;
Ayyash, Moussa .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2015, 17 (04) :2347-2376
[3]  
Andrea I., 2016, P IEEE S COMP COMM F, V2016, P180
[4]  
[Anonymous], 2013, BLOCK HOT
[5]  
[Anonymous], 2010, SPECIFICATION BLUETO
[6]  
Bluetooth SIG, 2016, BLUETOOTH SPECIFICAT, P154
[7]   Ghost-in-ZigBee: Energy Depletion Attack on ZigBee-Based Wireless Networks [J].
Cao, Xianghui ;
Shila, Devu Manikantan ;
Cheng, Yu ;
Yang, Zequ ;
Zhou, Yang ;
Chen, Jiming .
IEEE INTERNET OF THINGS JOURNAL, 2016, 3 (05) :816-829
[8]  
Cisco, 2013, RIGHT NOW 0729, P2
[9]  
Dini Gianluca, 2010, IEEE International Conference on Sensor Networks, Ubiquitous and Trustworthy Computing (SUTC 2010), P58, DOI 10.1109/SUTC.2010.15
[10]   Misuse-based detection of Z-Wave network attacks [J].
Fuller, Jonathan D. ;
Ramsey, Benjamin W. ;
Rice, Mason J. ;
Pecarina, John M. .
COMPUTERS & SECURITY, 2017, 64 :44-58