Skip to main navigation Skip to search Skip to main content

Timestamp Scheme to Mitigate Replay Attacks in Secure ZigBee Networks

  • Fadi Farha
  • , Huansheng Ning*
  • , Shunkun Yang
  • , Jiabo Xu
  • , Weishan Zhang
  • , Kim Kwang Raymond Choo
  • *Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

Abstract

ZigBee is one of the communication protocols used in the Internet of Things (IoT) applications. In typical deployment scenarios involving low-cost and low-power IoT devices, many communication features are disabled, consequently affecting the security offered by ZigBee. The ZigBee specification assumes that deployment of frame counters is sufficient to mitigate replay attacks in secure ZigBee networks. However, we demonstrate that it is insufficient in this paper (i.e., the network is no longer secure after the coordinator restarts). As a countermeasure, we present a timestamp-based scheme to mitigate replay attacks. Our mitigation strategy does not consume power significantly, and fully powered devices will be responsible for providing power-constrained devices with the current timestamp. The proposed scheme is designed for all ZigBee topologies and different states of ZigBee End Devices (ZEDs). Findings from our evaluation show that the proposed scheme can successfully mitigate replay attacks, with no significant network performance degradation even assuming a worst-case scenario (i.e., many devices are sending data simultaneously).

Original languageEnglish
Pages (from-to)342-351
Number of pages10
JournalIEEE Transactions on Mobile Computing
Volume21
Issue number1
DOIs
StatePublished - 1 Jan 2022

Keywords

  • Replay attack
  • ZigBee security
  • timestamp

Fingerprint

Dive into the research topics of 'Timestamp Scheme to Mitigate Replay Attacks in Secure ZigBee Networks'. Together they form a unique fingerprint.

Cite this