Abstract

ZigBee stack has been introduced to satisfy the requirements for low-cost equipment and low-power consumption of the Internet of Things (IoT) infrastructure. To meet these requirements, many communication features are disabled or minimized, which affects the efficienty of the ZigBee network security. Previous work assumes that the deployment of frame counters is a good mechanism for blocking the replay attack in ZigBee networks. However, this paper proves that ZigBee networks, even with frame counters deployed, are still vulnerable to replay attacks. Moreover, we propose an enhanced timestamp scheme to block the replay attack permanently while maintaining low-power consumption. The proposed solution covers all ZigBee topologies and ZigBee End Devices (ZEDs) cases.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.