Remotely Exploiting AT Command Attacks on ZigBee Networks
release_5pd4s3liqjfxziiwrwn4fzlbnq
by
Ivan Vaccari, Enrico Cambiaso, Maurizio Aiello
Abstract
Internet of Things networks represent an emerging phenomenon bringing connectivity to common sensors. Due to the limited capabilities and to the sensitive nature of the devices, security assumes a crucial and primary role. In this paper, we report an innovative and extremely dangerous threat targeting IoT networks. The attack is based on Remote AT Commands exploitation, providing a malicious user with the possibility of reconfiguring or disconnecting IoT sensors from the network. We present the proposed attack and evaluate its efficiency by executing tests on a real IoT network. Results demonstrate how the threat can be successfully executed and how it is able to focus on the targeted nodes, without affecting other nodes of the network.
In application/xml+jats
format
Archived Files and Locations
application/pdf 1.6 MB
file_6rufnunzazftzmjkiannvivvmq
|
web.archive.org (webarchive) downloads.hindawi.com (publisher) |
access all versions, variants, and formats of this works (eg, pre-prints)
Crossref Metadata (via API)
Worldcat
SHERPA/RoMEO (journal policies)
wikidata.org
CORE.ac.uk
Semantic Scholar
Google Scholar