TY - GEN
T1 - Analyzing the attack landscape of Zigbee-enabled IoT systems and reinstating users' privacy
AU - Wang, Weicheng
AU - Cicala, Fabrizio
AU - Hussain, Syed Rafiul
AU - Bertino, Elisa
AU - Li, Ninghui
N1 - Funding Information:
We thank the anonymous reviewers for their suggestions. This work was supported by NSA's Science of Security Lablet program through North Carolina State University.
Funding Information:
We thank the anonymous reviewers for their suggestions. This work was supported by NSA’s Science of Security Lablet program through North Carolina State University.
Publisher Copyright:
© 2020 ACM.
PY - 2020/7/8
Y1 - 2020/7/8
N2 - Zigbee network security relies on symmetric cryptography based on a pre-shared secret. In the current Zigbee protocol, the network coordinator creates a network key while establishing a network. The coordinator then shares the network key securely, encrypted under the pre-shared secret, with devices joining the network to ensure the security of future communications among devices through the network key. The pre-shared secret, therefore, needs to be installed in millions or more devices prior to deployment, and thus will be inevitably leaked, enabling attackers to compromise the confidentiality and integrity of the network. To improve the security of Zigbee networks, we propose a new certificate-less Zigbee joining protocol that leverages low-cost public-key primitives. The new protocol has two components. The first is to integrate Elliptic Curve Diffie-Hellman key exchange into the existing association request/response messages, and to use this key both for link-to-link communication and for encryption of the network key to enhance privacy of user devices. The second is to improve the security of the installation code, a new joining method introduced in Zigbee 3.0 for enhanced security, by using public key encryption. We analyze the security of our proposed protocol using the formal verification methods provided by ProVerif, and evaluate the efficiency and effectiveness of our solution with a prototype built with open source software and hardware stack. The new protocol does not introduce extra messages and the overhead is as lows as 3.8% on average for the join procedure.
AB - Zigbee network security relies on symmetric cryptography based on a pre-shared secret. In the current Zigbee protocol, the network coordinator creates a network key while establishing a network. The coordinator then shares the network key securely, encrypted under the pre-shared secret, with devices joining the network to ensure the security of future communications among devices through the network key. The pre-shared secret, therefore, needs to be installed in millions or more devices prior to deployment, and thus will be inevitably leaked, enabling attackers to compromise the confidentiality and integrity of the network. To improve the security of Zigbee networks, we propose a new certificate-less Zigbee joining protocol that leverages low-cost public-key primitives. The new protocol has two components. The first is to integrate Elliptic Curve Diffie-Hellman key exchange into the existing association request/response messages, and to use this key both for link-to-link communication and for encryption of the network key to enhance privacy of user devices. The second is to improve the security of the installation code, a new joining method introduced in Zigbee 3.0 for enhanced security, by using public key encryption. We analyze the security of our proposed protocol using the formal verification methods provided by ProVerif, and evaluate the efficiency and effectiveness of our solution with a prototype built with open source software and hardware stack. The new protocol does not introduce extra messages and the overhead is as lows as 3.8% on average for the join procedure.
UR - http://www.scopus.com/inward/record.url?scp=85091979799&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85091979799&partnerID=8YFLogxK
U2 - 10.1145/3395351.3399349
DO - 10.1145/3395351.3399349
M3 - Conference contribution
AN - SCOPUS:85091979799
T3 - WiSec 2020 - Proceedings of the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks
SP - 133
EP - 143
BT - WiSec 2020 - Proceedings of the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks
PB - Association for Computing Machinery
T2 - 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2020
Y2 - 8 July 2020 through 10 July 2020
ER -