Javascript must be enabled to continue!
Living in the Dark: MQTT-Based Exploitation of IoT Security Vulnerabilities in ZigBee Networks for Smart Lighting Control
View through CrossRef
The Internet of Things (IoT) has provided substantial enhancements to the communication of sensors, actuators, and their controllers, particularly in the field of home automation. Home automation is experiencing a huge rise in the proliferation of IoT devices such as smart bulbs, smart switches, and control gateways. However, the main challenge for such control systems is how to maximize security under limited resources such as low-processing power, low memory, low data rate, and low-bandwidth IoT networks. In order to address this challenge the adoption of IoT devices in automation has mandated the adoption of secure communication protocols to ensure that compromised key security objectives, such as confidentiality, integrity, and availability are addressed. In light of this, this work evaluates the feasibility of MQTT-based Denial of Service (DoS) attacks, Man-in-the-Middle (MitM), and masquerade attacks on a ZigBee network, an IoT standard used in wireless mesh networks. Performed through MQTT, the attacks extend to compromise neighboring Constrained Application Protocol (CoAP) nodes, a specialized service layer protocol for resource-constrained Internet devices. By demonstrating the attacks on an IKEA TRÅDFRI lighting system, the impact of exploiting ZigBee keys, the basis of ZigBee security, is shown. The reduction of vulnerabilities to prevent attacks is imperative for application developers in this domain. Two Intrusion Detection Systems (IDSs) are proposed to mitigate against the proposed attacks, followed by recommendations for solution providers to improve IoT firmware security. The main motivation and purpose of this work is to demonstrate that conventional attacks are feasible and practical in commercial home automation IoT devices, regardless of the manufacturer. Thus, the contribution to the state-of-the-art is the design of attacks that demonstrate how known vulnerabilities can be exploited in commercial IoT devices for the purpose of motivating manufacturers to produce IoT systems with improved security.
Title: Living in the Dark: MQTT-Based Exploitation of IoT Security Vulnerabilities in ZigBee Networks for Smart Lighting Control
Description:
The Internet of Things (IoT) has provided substantial enhancements to the communication of sensors, actuators, and their controllers, particularly in the field of home automation.
Home automation is experiencing a huge rise in the proliferation of IoT devices such as smart bulbs, smart switches, and control gateways.
However, the main challenge for such control systems is how to maximize security under limited resources such as low-processing power, low memory, low data rate, and low-bandwidth IoT networks.
In order to address this challenge the adoption of IoT devices in automation has mandated the adoption of secure communication protocols to ensure that compromised key security objectives, such as confidentiality, integrity, and availability are addressed.
In light of this, this work evaluates the feasibility of MQTT-based Denial of Service (DoS) attacks, Man-in-the-Middle (MitM), and masquerade attacks on a ZigBee network, an IoT standard used in wireless mesh networks.
Performed through MQTT, the attacks extend to compromise neighboring Constrained Application Protocol (CoAP) nodes, a specialized service layer protocol for resource-constrained Internet devices.
By demonstrating the attacks on an IKEA TRÅDFRI lighting system, the impact of exploiting ZigBee keys, the basis of ZigBee security, is shown.
The reduction of vulnerabilities to prevent attacks is imperative for application developers in this domain.
Two Intrusion Detection Systems (IDSs) are proposed to mitigate against the proposed attacks, followed by recommendations for solution providers to improve IoT firmware security.
The main motivation and purpose of this work is to demonstrate that conventional attacks are feasible and practical in commercial home automation IoT devices, regardless of the manufacturer.
Thus, the contribution to the state-of-the-art is the design of attacks that demonstrate how known vulnerabilities can be exploited in commercial IoT devices for the purpose of motivating manufacturers to produce IoT systems with improved security.
Related Results
Preventing MQTT Vulnerabilities Using IoT-Enabled Intrusion Detection System
Preventing MQTT Vulnerabilities Using IoT-Enabled Intrusion Detection System
The advancement in the domain of IoT accelerated the development of new communication technologies such as the Message Queuing Telemetry Transport (MQTT) protocol. Although MQTT se...
Study pada ZigBee Protocol
Study pada ZigBee Protocol
Nowadays, Technology is growing rapidly, the one of example of technology, helps the human being to fulfill theirneed of information. The development of information technology and ...
A COMPREHENSIVE REVIEW OF ENERGY-EFFICIENT LIGHTING TECHNOLOGIES AND TRENDS
A COMPREHENSIVE REVIEW OF ENERGY-EFFICIENT LIGHTING TECHNOLOGIES AND TRENDS
Energy-efficient lighting technologies have undergone significant advancements in recent years, driving a transformation in the lighting industry. This comprehensive review explore...
A taxonomy of endpoint vulnerabilities and affected blockchain architecture layers
A taxonomy of endpoint vulnerabilities and affected blockchain architecture layers
AbstractBlockchain technology has gained significant attention and adoption due to its decentralized nature, and promising secure and immutable transactions. The interpretation of ...
Pioneering advanced security solutions for reinforcement learning-based adaptive key rotation in Zigbee networks
Pioneering advanced security solutions for reinforcement learning-based adaptive key rotation in Zigbee networks
AbstractIn the rapidly evolving landscape of Internet of Things (IoT), Zigbee networks have emerged as a critical component for enabling wireless communication in a variety of appl...
Simple Nomographs for Assessing Lighting in Urban Environments
Simple Nomographs for Assessing Lighting in Urban Environments
<p>Incorporating different technologies and lighting techniques in the illumination of structures has allowed us to portray fantastic night time vistas of our cities. However...
Pelatihan Internet of Things (IoT) dalam peningkatan kompetensi siswa multimedia di SMK Perguruan Buddhi
Pelatihan Internet of Things (IoT) dalam peningkatan kompetensi siswa multimedia di SMK Perguruan Buddhi
Pelatihan Internet of Things (IoT) menjadi bagian penting dalam pengembangan kompetensi siswa jurusan multimedia di SMK Perguruan Buddhi. Era digital menuntut adanya pemahaman mend...
Design and Implementation of Efficient IoT Authentication Schemes for MQTT 5.0
Design and Implementation of Efficient IoT Authentication Schemes for MQTT 5.0
<p>MQTT (Message Queue Telemetry Transport) is one of the most popular Internet of Things (IoT) communication protocols, owing to its lightweight and easiness to use. The pre...

