zigator analyzing the security of zigbee enabled smart
play

Zigator: Analyzing the Security of Zigbee-Enabled Smart Homes - PowerPoint PPT Presentation

Zigator: Analyzing the Security of Zigbee-Enabled Smart Homes Dimitrios-Georgios Akestoridis, Madhumitha Harishankar, Michael Weber, and Patrick Tague Carnegie Mellon University ACM WiSec 2020 Motivation Smart home network security affects


  1. Zigator: Analyzing the Security of Zigbee-Enabled Smart Homes Dimitrios-Georgios Akestoridis, Madhumitha Harishankar, Michael Weber, and Patrick Tague Carnegie Mellon University ACM WiSec 2020

  2. Motivation • Smart home network security affects the physical security of residents Akestoridis et al. Zigator: Analyzing the Security of Zigbee-Enabled Smart Homes ACM WiSec 2020 2

  3. Motivation • Smart home network security affects the physical security of residents • Zigbee supports two security models: • Distributed ⇒ recommended for ease of use • Centralized ⇒ recommended for higher security Akestoridis et al. Zigator: Analyzing the Security of Zigbee-Enabled Smart Homes ACM WiSec 2020 2

  4. Motivation • Smart home network security affects the physical security of residents • Zigbee supports two security models: • Distributed ⇒ recommended for ease of use • Centralized ⇒ recommended for higher security • High-level view of a Zigbee packet without any security features: SYNC Header PHY Header MAC Header NWK Header APS Header APS Payload MAC Footer Defined by the Defined by the Defined by the Defined by the IEEE 802.15.4 Zigbee Alliance Zigbee Alliance IEEE 802.15.4 standard and Manufacturers standard Akestoridis et al. Zigator: Analyzing the Security of Zigbee-Enabled Smart Homes ACM WiSec 2020 2

  5. Motivation • Smart home network security affects the physical security of residents • Zigbee supports two security models: • Distributed ⇒ recommended for ease of use • Centralized ⇒ recommended for higher security • High-level view of a Zigbee packet without any security features: SYNC Header PHY Header MAC Header NWK Header APS Header APS Payload MAC Footer Defined by the Defined by the Defined by the Defined by the IEEE 802.15.4 Zigbee Alliance Zigbee Alliance IEEE 802.15.4 standard and Manufacturers standard We study the security consequences of the design choice to disable MAC-layer security in centralized Zigbee networks Akestoridis et al. Zigator: Analyzing the Security of Zigbee-Enabled Smart Homes ACM WiSec 2020 2

  6. Threat Model and Assumptions • Security objectives: • Authenticity, Integrity, Confidentiality, and Availability Akestoridis et al. Zigator: Analyzing the Security of Zigbee-Enabled Smart Homes ACM WiSec 2020 3

  7. Threat Model and Assumptions • Security objectives: • Authenticity, Integrity, Confidentiality, and Availability • Assumptions: • The end user and their devices are trusted Akestoridis et al. Zigator: Analyzing the Security of Zigbee-Enabled Smart Homes ACM WiSec 2020 3

  8. Threat Model and Assumptions • Security objectives: • Authenticity, Integrity, Confidentiality, and Availability • Assumptions: • The end user and their devices are trusted • The attacker is an outsider with potentially more powerful hardware • The attacker has no prior knowledge of any network key • The attacker is aware of the default Trust Center link key • The attacker may have access to a subset of install codes Akestoridis et al. Zigator: Analyzing the Security of Zigbee-Enabled Smart Homes ACM WiSec 2020 3

  9. Threat Model and Assumptions • Security objectives: • Authenticity, Integrity, Confidentiality, and Availability • Assumptions: • The end user and their devices are trusted • The attacker is an outsider with potentially more powerful hardware • The attacker has no prior knowledge of any network key • The attacker is aware of the default Trust Center link key • The attacker may have access to a subset of install codes • We do not consider uncommon device configurations like low-power routers Akestoridis et al. Zigator: Analyzing the Security of Zigbee-Enabled Smart Homes ACM WiSec 2020 3

  10. Threat Model and Assumptions • Security objectives: • Authenticity, Integrity, Confidentiality, and Availability • Assumptions: • The end user and their devices are trusted • The attacker is an outsider with potentially more powerful hardware • The attacker has no prior knowledge of any network key • The attacker is aware of the default Trust Center link key • The attacker may have access to a subset of install codes • We do not consider uncommon device configurations like low-power routers • Attacker’s goal: • Obtaining the network key from an already formed Zigbee network Akestoridis et al. Zigator: Analyzing the Security of Zigbee-Enabled Smart Homes ACM WiSec 2020 3

  11. Security Analysis with Zigator Software-Defined Radio Ethernet PHY Monitoring 1 2 3 4 5 6 7 8 9 0 Zigator * # Packet Analysis USB Zigbee Network IEEE 802.15.4 USB Adapter Selective Jamming Akestoridis et al. Zigator: Analyzing the Security of Zigbee-Enabled Smart Homes ACM WiSec 2020 4

  12. Our implementation of a selective jammer Frame on Air and Interrupts Waiting for RX_START Jammer’s State and Actions Time Akestoridis et al. Zigator: Analyzing the Security of Zigbee-Enabled Smart Homes ACM WiSec 2020 5

  13. Our implementation of a selective jammer SHR Frame on Air and Interrupts Waiting for RX_START Jammer’s State and Actions Time Akestoridis et al. Zigator: Analyzing the Security of Zigbee-Enabled Smart Homes ACM WiSec 2020 5

  14. Our implementation of a selective jammer SHR PHR Frame on Air and Interrupts Waiting for RX_START Jammer’s State and Actions Time Akestoridis et al. Zigator: Analyzing the Security of Zigbee-Enabled Smart Homes ACM WiSec 2020 5

  15. Our implementation of a selective jammer SHR PHR MPDU Frame on Air and Interrupts RX_START Waiting for RX_START Checking Jamming Condition . . . Jammer’s State and Actions Read 1 byte and then wait 32 µs to read the next byte Time Akestoridis et al. Zigator: Analyzing the Security of Zigbee-Enabled Smart Homes ACM WiSec 2020 5

  16. Our implementation of a selective jammer SHR PHR MPDU Frame on Air and Interrupts RX_START Waiting for RX_START Checking Jamming Condition Transmitting Jamming Packet . . . FORCE_PLL_ON SLP_TR Jammer’s State and Actions Read 1 byte and then wait 32 µs to read the next byte Time Akestoridis et al. Zigator: Analyzing the Security of Zigbee-Enabled Smart Homes ACM WiSec 2020 5

  17. Our implementation of a selective jammer SHR PHR MPDU Frame on Air and Interrupts RX_START Waiting for RX_START Checking Jamming Condition Transmitting Jamming Packet Waiting for RX_START . . . FORCE_PLL_ON RX_ON SLP_TR Jammer’s State and Actions Read 1 byte and then wait 32 µs to read the next byte Time Akestoridis et al. Zigator: Analyzing the Security of Zigbee-Enabled Smart Homes ACM WiSec 2020 5

  18. Combining Core Functionalities Akestoridis et al. Zigator: Analyzing the Security of Zigbee-Enabled Smart Homes ACM WiSec 2020 6

  19. Combining Core Functionalities Akestoridis et al. Zigator: Analyzing the Security of Zigbee-Enabled Smart Homes ACM WiSec 2020 6

  20. Combining Core Functionalities Akestoridis et al. Zigator: Analyzing the Security of Zigbee-Enabled Smart Homes ACM WiSec 2020 6

  21. Combining Core Functionalities Akestoridis et al. Zigator: Analyzing the Security of Zigbee-Enabled Smart Homes ACM WiSec 2020 6

  22. Combining Core Functionalities Akestoridis et al. Zigator: Analyzing the Security of Zigbee-Enabled Smart Homes ACM WiSec 2020 6

  23. Experimental Setup • We captured packets that were generated from ten commercial Zigbee devices • We conducted eight experiments that differed in the smart hub that was used and the physical topology of the devices • Our experiments lasted about 34.644 hours in total and resulted in a dataset of 571,509 valid packets Akestoridis et al. Zigator: Analyzing the Security of Zigbee-Enabled Smart Homes ACM WiSec 2020 7

  24. Inferring the Topology of a Zigbee Network • Log distinct pairs of source and destination addresses • Trivial identification of the Zigbee Coordinator ⇒ always 0x0000 0x0000 0x7de1 0x68d7 0x6231 0x2ffb 0x989f 0x957f 0x14c9 0x822c Akestoridis et al. Zigator: Analyzing the Security of Zigbee-Enabled Smart Homes ACM WiSec 2020 8

  25. Identifying Logical Device Types ZR ZC A ZED Akestoridis et al. Zigator: Analyzing the Security of Zigbee-Enabled Smart Homes ACM WiSec 2020 9

  26. Identifying Logical Device Types ZR 1. Beacon Request 1. Beacon Request ZC A 1. Beacon Request ZED Akestoridis et al. Zigator: Analyzing the Security of Zigbee-Enabled Smart Homes ACM WiSec 2020 9

  27. Identifying Logical Device Types ZR 1. Beacon Request 2. Beacon 1. Beacon Request ZC A 2. Beacon 1. Beacon Request ZED Akestoridis et al. Zigator: Analyzing the Security of Zigbee-Enabled Smart Homes ACM WiSec 2020 9

  28. Identifying Logical Device Types ZR ZR 1. Beacon Request 2. Beacon 1. Beacon Request ZC A ZC A 2. Beacon 1. Beacon Request ZED ZED Akestoridis et al. Zigator: Analyzing the Security of Zigbee-Enabled Smart Homes ACM WiSec 2020 9

  29. Identifying Logical Device Types ZR ZR 1. Orphan Notification 1. Beacon Request 2. Beacon 1. Beacon Request 1. Orphan Notification ZC A ZC A 2. Beacon 1. Orphan Notification 1. Beacon Request ZED ZED Akestoridis et al. Zigator: Analyzing the Security of Zigbee-Enabled Smart Homes ACM WiSec 2020 9

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend