Remotely Exploiting AT Command Attacks on ZigBee Networks

Internet of Things networks represent an emerging phenomenon bringing connectivity to common sensors. Due to the limited capabilities and to the sensitive nature of the devices, security assumes a crucial and primary role. In this paper, we report an innovative and extremely dangerous threat targeti...

Full description

Bibliographic Details
Main Authors: Ivan Vaccari, Enrico Cambiaso, Maurizio Aiello
Format: Article
Language:English
Published: Hindawi-Wiley 2017-01-01
Series:Security and Communication Networks
Online Access:http://dx.doi.org/10.1155/2017/1723658
id doaj-a5e5324ab9374f4eae17e1ea6d5dcf59
record_format Article
spelling doaj-a5e5324ab9374f4eae17e1ea6d5dcf592020-11-25T02:56:38ZengHindawi-WileySecurity and Communication Networks1939-01141939-01222017-01-01201710.1155/2017/17236581723658Remotely Exploiting AT Command Attacks on ZigBee NetworksIvan Vaccari0Enrico Cambiaso1Maurizio Aiello2National Research Council (CNR), IEIIT Institute, Via De Marini 6, 16149 Genova, ItalyNational Research Council (CNR), IEIIT Institute, Via De Marini 6, 16149 Genova, ItalyNational Research Council (CNR), IEIIT Institute, Via De Marini 6, 16149 Genova, ItalyInternet of Things networks represent an emerging phenomenon bringing connectivity to common sensors. Due to the limited capabilities and to the sensitive nature of the devices, security assumes a crucial and primary role. In this paper, we report an innovative and extremely dangerous threat targeting IoT networks. The attack is based on Remote AT Commands exploitation, providing a malicious user with the possibility of reconfiguring or disconnecting IoT sensors from the network. We present the proposed attack and evaluate its efficiency by executing tests on a real IoT network. Results demonstrate how the threat can be successfully executed and how it is able to focus on the targeted nodes, without affecting other nodes of the network.http://dx.doi.org/10.1155/2017/1723658
collection DOAJ
language English
format Article
sources DOAJ
author Ivan Vaccari
Enrico Cambiaso
Maurizio Aiello
spellingShingle Ivan Vaccari
Enrico Cambiaso
Maurizio Aiello
Remotely Exploiting AT Command Attacks on ZigBee Networks
Security and Communication Networks
author_facet Ivan Vaccari
Enrico Cambiaso
Maurizio Aiello
author_sort Ivan Vaccari
title Remotely Exploiting AT Command Attacks on ZigBee Networks
title_short Remotely Exploiting AT Command Attacks on ZigBee Networks
title_full Remotely Exploiting AT Command Attacks on ZigBee Networks
title_fullStr Remotely Exploiting AT Command Attacks on ZigBee Networks
title_full_unstemmed Remotely Exploiting AT Command Attacks on ZigBee Networks
title_sort remotely exploiting at command attacks on zigbee networks
publisher Hindawi-Wiley
series Security and Communication Networks
issn 1939-0114
1939-0122
publishDate 2017-01-01
description Internet of Things networks represent an emerging phenomenon bringing connectivity to common sensors. Due to the limited capabilities and to the sensitive nature of the devices, security assumes a crucial and primary role. In this paper, we report an innovative and extremely dangerous threat targeting IoT networks. The attack is based on Remote AT Commands exploitation, providing a malicious user with the possibility of reconfiguring or disconnecting IoT sensors from the network. We present the proposed attack and evaluate its efficiency by executing tests on a real IoT network. Results demonstrate how the threat can be successfully executed and how it is able to focus on the targeted nodes, without affecting other nodes of the network.
url http://dx.doi.org/10.1155/2017/1723658
work_keys_str_mv AT ivanvaccari remotelyexploitingatcommandattacksonzigbeenetworks
AT enricocambiaso remotelyexploitingatcommandattacksonzigbeenetworks
AT maurizioaiello remotelyexploitingatcommandattacksonzigbeenetworks
_version_ 1724712964496293888