Zigbee's Network Rejoin Procedure for IoT Systems: Vulnerabilities and Implications

2Citations
Citations of this article
12Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Internet of Things (IoT) services are gaining increasing popularity, and IoT devices are widely deployed at many smart homes. Among all the IoT communication protocols, Zigbee is a dominant one used by billions of devices and customers. However, the design of Zigbee has not been carefully evaluated and could be exploited by attackers. In this paper, we focus on Zigbee's network rejoin procedure, which aims to allow devices to automatically recover their network status when they accidentally go offline. We develop an automated verification tool Verejoin to perform a systematic study on the rejoin procedure. Using this tool, we not only confirm a well-known design flaw, but also reveal two undiscovered design flaws. Moreover, we construct four proof-of-concept (PoC) attacks to exploit these design flaws. These vulnerabilities create new attack surfaces for attackers to manipulate Zigbee devices, and the damage of these vulnerabilities ranges from denial of service to device hijacking. We further design a Zigbee testing tool ZigHomer to confirm these vulnerabilities in real-world devices. Using ZigHomer, we conduct thorough evaluations of off-the-shelf Zigbee devices from leading IoT vendors, and the evaluation result shows the prevalence and severity of these vulnerabilities. Finally, we reported our findings to related parties, and they all acknowledged the significant security impact. We further collaborate with Zigbee Alliance to amend the Zigbee specification, and successfully addressed our reported vulnerabilities.

References Powered by Scopus

On the Security of Public Key Protocols

4316Citations
N/AReaders
Get full text

The model checker SPIN

2898Citations
N/AReaders
Get full text

DDoS in the IoT: Mirai and other botnets

1493Citations
N/AReaders
Get full text

Cited by Powered by Scopus

IoT Zigbee device security: A comprehensive review

35Citations
N/AReaders
Get full text

LLMIF: Augmented Large Language Model for Fuzzing IoT Devices

7Citations
N/AReaders
Get full text

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Cite

CITATION STYLE

APA

Wang, J., Li, Z., Sun, M., & Lui, J. C. S. (2022). Zigbee’s Network Rejoin Procedure for IoT Systems: Vulnerabilities and Implications. In ACM International Conference Proceeding Series (pp. 292–307). Association for Computing Machinery. https://doi.org/10.1145/3545948.3545953

Readers over time

‘22‘23‘2402468

Readers' Seniority

Tooltip

PhD / Post grad / Masters / Doc 4

100%

Readers' Discipline

Tooltip

Computer Science 4

100%

Save time finding and organizing research with Mendeley

Sign up for free
0