Preview

Nt1310 Unit 3 Summary

Good Essays
Open Document
Open Document
734 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Nt1310 Unit 3 Summary
Although Zigbee implements a wide assortment of security measures, there are still a variety of vulnerabilities and attack methods that can be used. These attacks and how they can be carried out will be described in this Section. The first and possibly easiest attack to implement is the denial of service attack. These types of attacks overload the network such that service is denied to the network’s end users. In a typical wired network this is accomplished by having a huge number nodes simultaneously requesting data from a server. The server will not be able to process all of the requests and valid requests will be dropped. In Zigbee networks this attack is made significantly easier because Zigbee operates in the wireless domain. Valid users can be denied service to the network simply by creating noise on the wireless channel. This noise creates errors in …show more content…
Although the Zigbee protocol implements the Advanced Encryption Standard (AES) protocol the initial key exchange is not protected against sniffing. The network keys are often exchanged in plain text or are encoded using the default factory key. Consequently, if an attacker were to sniff the initial exchange of packets, that attacker would be able to gain access to the network keys and the entire network. The difficulty with this type of attack is that the key exchange only occurs when a new node registers with the network. After this initial exchange all packets are encoded. The trick for these types of attacks, is forcing the network to enter an initialization state. This can be accomplished by creating RF interference that will result in dropped packets. After a certain number of dropped packets a wireless node will think that it has lost connection to the network and will try to reconnect. Then when this occurs the network key can be sniffed. These types of attacks have been carried out by a large number of security researchers [6, 7, 8, 9,

You May Also Find These Documents Helpful

  • Satisfactory Essays

    It-242 Wlan Check Point

    • 265 Words
    • 2 Pages

    There are several ways a person can go about securing a wireless local area network, or WLAN. One of the best ways in my opinion is to not broadcast the network publicly. This does not prevent people from accessing the network, but instead prevents the network from being visible to others. A person searching for a network to connect to can easily see your network exists. Without broadcasting the network people that are not aware of your network have no way of even knowing it is there. Another way to help to secure a WLAN is by using MAC address filtering. MAC filtering requires a list of the valid MAC addresses the user wants to be able to access the network. Any computer with a MAC address that is not on the provided list will not be able to gain access to the network. These steps alone are not enough to keep a network secure but when used with other security measures such as strong passwords and encryption can make a network a lot less accessible from malicious outsiders. These individuals can be a bothersome hindrance stealing network bandwidth or far more dangerous individuals that intend to cause harm with malicious programs or viruses or to steal private information. A wireless network may never be completely secure, but it is always best practice to use as many security steps as possible to insure the safety of the data on the network.…

    • 265 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Power Grid

    • 1857 Words
    • 5 Pages

    Chen, P.-Y., Cheng, S.-M., & Chen, K.-C. (2012). Smart Attacks in Smart Grid Communication Networks. IEEE Communications Magazine, 50(8), 24-29.…

    • 1857 Words
    • 5 Pages
    Better Essays
  • Better Essays

    Network Infrastructure

    • 2917 Words
    • 12 Pages

    Bibliography: Anil Khatod, A. I. (2004, November 4). Five Steps To WLAN Security -- A Layered Approach. Retrieved June 1, 2012, from www.computerworld.com: http://www.computerworld.com/s/article/97178/Five_Steps_To_WLAN_Security_A_Layered_Approach…

    • 2917 Words
    • 12 Pages
    Better Essays
  • Good Essays

    Transmissions over wireless networks can be intercepted by any suitable device within the transmission radius. If a network intruder is able to attach to an unsecured AP, they can get access to the wireless network and the Internet connection.…

    • 689 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    In wireless networks the security concerns are considered an important issue, various techniques are used for that purpose. Traditional security mechanisms (authentication, encryption) provide an abstract level of security but some reactive security mechanisms and deep level of inspection is always required. Here some basic intrusion detection systems are discussed and analyzed, and we have shown the advantages and limitations of each technique through a specific comparison between that techniques. And finally we have talked in some details about the HawkEye IDS and we have shown its architecture and mechanism of work, and talked about its advantages over the other IDS we have discussed.…

    • 4430 Words
    • 18 Pages
    Powerful Essays
  • Good Essays

    Zigbee is an established set of specifications for wireless personal area networking (WPAN), i.e. digital radio connection between computers and related devices. WPAN low rate or zigbee provides specifications for devices that have low data rates, consume very low power and thus characterized by long battery life. zigbee makes possible completely networked homes where all devices are able to communicate and controlled by a single unit personal computers may be connected to a local area network (LAN), either by a cable or a wireless connections.…

    • 939 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Compared to Bluetooth, ZigBee provides higher network flexibility and a larger number of nodes, and a better transmission range with low power consumption. Recently, ZigBee-based wireless networks were tested in various applications. In [8], the authors investigate the use of ZigBee and mobile phones in monitoring elderly patients with diabetes mellitus or heart diseases. A ZigBee WiMAX nursery system for patient monitoring was proposed in [9]. An interesting application of ZigBee-based wireless sensor nodes in the real-time monitoring of fruit logistics is discussed in [10]. The work presented here simply attempts to probe into the applicability, usefulness, and practicality of using wireless-ZigBee based network in monitoring the signs of patients on a hospital floor and surrounding area without confining them to a bed. The presented solution is meant to be both simple, cost effective and hopefully causes minimal interference with the patient’s mobility and comfort. A wearable sensor unit, attached to the patient’s body, reads and transmits the patient’s fetal…

    • 2358 Words
    • 10 Pages
    Powerful Essays
  • Powerful Essays

    Wireless Sensor Network

    • 15813 Words
    • 64 Pages

    [26]”An Efficient Authentication Strategy for Reprogramming of Sensor Networks” Jin Tan, JinTan Chen, YanQiu Liu, 2007 International Conference on Computational Intelligence and Security, 2007 IEEE.…

    • 15813 Words
    • 64 Pages
    Powerful Essays
  • Satisfactory Essays

    remote access it255

    • 345 Words
    • 2 Pages

    • The power of access points will be turned down to a minimum that still allows…

    • 345 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Josh

    • 6922 Words
    • 28 Pages

    Abstract. We demonstrate an active attack on the WEP protocol that is able to recover a 104-bit WEP key using less than 40,000 frames with a success probability of 50%. In order to succeed in 95% of all cases, 85,000 packets are needed. The IV of these packets can be randomly chosen. This is an improvement in the number of required frames by more than an order of magnitude over the best known key-recovery attacks for WEP. On a IEEE 802.11g network, the number of frames required can be obtained by re-injection in less than a minute. The required computational effort is approximately 220 RC4 key setups, which on current desktop and laptop CPUs is negligible.…

    • 6922 Words
    • 28 Pages
    Good Essays
  • Good Essays

    IT/241 Wireless Security

    • 391 Words
    • 2 Pages

    With the talk about the categories of attackers, the issue of wireless security and how to protect your network comes up. There are three types of security protection, MAC filtering, WEP, and authentication. Each has a different way to secure the network against unauthorized access. MAC filtering allows only traffic from specific client stations to pass through the network based on their unique MAC addresses (Coleman & Westcott, 2012). This gives the administrator the ability to lock the network down to only the devices they want on the network, giving another layer of security. WEP, or wired equivalent privacy, uses a hexadecimal or ASCII character key to secure traffic on the network. Finally, authentication is done by the access point sending a challenge to be encrypted by the client and finally sent back to the access point for verification. Looking at all three, MAC filtering would be the best way to secure a wireless network. While people can spoof MAC addresses, allowing the hacker to change the MAC address of the client, that person…

    • 391 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Zigbee is PAN technology based on the IEEE 802.15.4 standard. Unlike Bluetooth or wireless USB devices, zigbee devices have the ability to form a mesh network between nodes. Meshing is a type of daisy chaining from one device to another. This technique allows the short range of an individual node to be expanded and multiplied, covering a much larger area.…

    • 12661 Words
    • 51 Pages
    Powerful Essays
  • Best Essays

    5.1 Use Case Diagram

    • 2225 Words
    • 9 Pages

    3. S.Prasanna, Srinivasa Rao, “An Overview of Wireless Sensor Networks Applications and Security”, International Journal of Soft Computing and Engineering, vol.2, no.2, May 2012, pp. 538-540.…

    • 2225 Words
    • 9 Pages
    Best Essays
  • Powerful Essays

    CEAACK MANET Analysis

    • 1970 Words
    • 8 Pages

    This unstable nature of wireless networks cannot be stated as an excuse for slack security measures .Vulnerable or not the data transmitted must maintain its integrity and the confidentiality of the sender. Authentication and authorization are the two faces of data security which otherwise can be interpreted as the integrity and confidentiality of data. This dual aspect of security is only possible with the inclusion of strong cryptographic techniques that can safeguard the transmitted data with virtually unbreakable cryptographic codes that helps the network to secure itself against…

    • 1970 Words
    • 8 Pages
    Powerful Essays
  • Powerful Essays

    This paper will discuss the Wireless Ethernet product produced by Cisco, the Aironet 3500 wireless access point. The Aironet 3500 access points are designed for installation into areas of wireless frequency saturation. They are an ideal solution for businesses, hospitals and universities plagued by interference devices such as microwave ovens, rogue devices such as phones and digital tablets. Universities can take advantage of the technology by deploying the APs on dorm floors knowing they have the capability to classify the myriad of devices students bring to campus which would normally congest the wireless network.…

    • 1599 Words
    • 7 Pages
    Powerful Essays

Related Topics