본문 바로가기
  • Home

Simulation model for the attack node on ZigBee network

  • Journal of Software Assessment and Valuation
  • Abbr : JSAV
  • 2011, 7(1), pp.61-67
  • Publisher : Korea Software Assessment and Valuation Society
  • Research Area : Engineering > Computer Science
  • Received : April 20, 2011
  • Accepted : June 20, 2011
  • Published : June 30, 2011

Ki Jang Geun 1

1공주대학교

ABSTRACT

ZigBee is targeted at wireless applications that require a low data rate, long operation life, and low implementation cost. ZigBee protocol is simpler and less expensive than other wireless protocols such as WLAN and Bluetooth. The low cost allows the ZigBee technology to be widely deployed in wireless control and monitoring applications and the low power-usage allows longer life with smaller batteries. But advantages of simplicity and low cost in ZigBee cause security problems. For example, ZigBee offers no protection against replay attacks, in which an attacker simply resends recorded packets to the network. In this paper, simulation node models of the attacker are developed for implementing environments of study on security of ZigBee networks. The developed node models have the attack functions such as ZBdump, ZBreplay, and ZBassocFlooding. In order to verify the developed models, we designed and constructed several simulation scenarios. The simulation results show that the developed simulation node models are useful for ZigBee security studies in various environments.

KEYWORDS