Remotely Exploiting AT Command Attacks on ZigBee Networks
Internet of Things networks represent an emerging phenomenon bringing connectivity to common sensors. Due to the limited capabilities and to the sensitive nature of the devices, security assumes a crucial and primary role. In this paper, we report an innovative and extremely dangerous threat targeti...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Hindawi-Wiley
2017-01-01
|
Series: | Security and Communication Networks |
Online Access: | http://dx.doi.org/10.1155/2017/1723658 |
id |
doaj-a5e5324ab9374f4eae17e1ea6d5dcf59 |
---|---|
record_format |
Article |
spelling |
doaj-a5e5324ab9374f4eae17e1ea6d5dcf592020-11-25T02:56:38ZengHindawi-WileySecurity and Communication Networks1939-01141939-01222017-01-01201710.1155/2017/17236581723658Remotely Exploiting AT Command Attacks on ZigBee NetworksIvan Vaccari0Enrico Cambiaso1Maurizio Aiello2National Research Council (CNR), IEIIT Institute, Via De Marini 6, 16149 Genova, ItalyNational Research Council (CNR), IEIIT Institute, Via De Marini 6, 16149 Genova, ItalyNational Research Council (CNR), IEIIT Institute, Via De Marini 6, 16149 Genova, ItalyInternet of Things networks represent an emerging phenomenon bringing connectivity to common sensors. Due to the limited capabilities and to the sensitive nature of the devices, security assumes a crucial and primary role. In this paper, we report an innovative and extremely dangerous threat targeting IoT networks. The attack is based on Remote AT Commands exploitation, providing a malicious user with the possibility of reconfiguring or disconnecting IoT sensors from the network. We present the proposed attack and evaluate its efficiency by executing tests on a real IoT network. Results demonstrate how the threat can be successfully executed and how it is able to focus on the targeted nodes, without affecting other nodes of the network.http://dx.doi.org/10.1155/2017/1723658 |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Ivan Vaccari Enrico Cambiaso Maurizio Aiello |
spellingShingle |
Ivan Vaccari Enrico Cambiaso Maurizio Aiello Remotely Exploiting AT Command Attacks on ZigBee Networks Security and Communication Networks |
author_facet |
Ivan Vaccari Enrico Cambiaso Maurizio Aiello |
author_sort |
Ivan Vaccari |
title |
Remotely Exploiting AT Command Attacks on ZigBee Networks |
title_short |
Remotely Exploiting AT Command Attacks on ZigBee Networks |
title_full |
Remotely Exploiting AT Command Attacks on ZigBee Networks |
title_fullStr |
Remotely Exploiting AT Command Attacks on ZigBee Networks |
title_full_unstemmed |
Remotely Exploiting AT Command Attacks on ZigBee Networks |
title_sort |
remotely exploiting at command attacks on zigbee networks |
publisher |
Hindawi-Wiley |
series |
Security and Communication Networks |
issn |
1939-0114 1939-0122 |
publishDate |
2017-01-01 |
description |
Internet of Things networks represent an emerging phenomenon bringing connectivity to common sensors. Due to the limited capabilities and to the sensitive nature of the devices, security assumes a crucial and primary role. In this paper, we report an innovative and extremely dangerous threat targeting IoT networks. The attack is based on Remote AT Commands exploitation, providing a malicious user with the possibility of reconfiguring or disconnecting IoT sensors from the network. We present the proposed attack and evaluate its efficiency by executing tests on a real IoT network. Results demonstrate how the threat can be successfully executed and how it is able to focus on the targeted nodes, without affecting other nodes of the network. |
url |
http://dx.doi.org/10.1155/2017/1723658 |
work_keys_str_mv |
AT ivanvaccari remotelyexploitingatcommandattacksonzigbeenetworks AT enricocambiaso remotelyexploitingatcommandattacksonzigbeenetworks AT maurizioaiello remotelyexploitingatcommandattacksonzigbeenetworks |
_version_ |
1724712964496293888 |