Side-channel information leaks of Z-wave smart home IoT devices: Demo abstract

7Citations
Citations of this article
11Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Z-Wave is one of the key access protocols of the Internet of Things (IoT). It is highly popular in home automation and security system applications due to its minimum power consumption, reliability, and cost effectiveness. With an estimate of over 100 million deployed Z-Wave devices around the globe, it is essential to understand their security landscape. For instance, Z-Wave devices can leak personal information about the home dwellers as well as their possessions and buglers can use compromised Z-Wave devices to disable security systems or even to feed incorrect information. In this paper, we present an experiment setup and early results of side-channel information leaks of Z-Wave. We show that Z-Wave traffic despite being encrypted, leaks information through side-channels and an attacker who can passively capture Z-Wave frames by simply being in the vicinity of a house can identify Z-Wave devices inside the house.

Cite

CITATION STYLE

APA

Liou, J. C., Jain, S., Singh, S. R., Taksinwarajan, D., & Seneviratne, S. (2020). Side-channel information leaks of Z-wave smart home IoT devices: Demo abstract. In SenSys 2020 - Proceedings of the 2020 18th ACM Conference on Embedded Networked Sensor Systems (pp. 637–638). Association for Computing Machinery, Inc. https://doi.org/10.1145/3384419.3430436

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free