Cargando…
A Comprehensive Analysis: Evaluating Security Characteristics of Xbee Devices against Zigbee Protocol
In recent times, the security of sensor networks, especially in the field of IoT, has become a priority. This article focuses on the security features of the Zigbee protocol in Xbee devices developed by Digi International, specifically in the Xbee 3 (XB3-24) devices. Using the TI LaunchXL-CC26X2R1 k...
Autores principales: | , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2023
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10649587/ https://www.ncbi.nlm.nih.gov/pubmed/37960436 http://dx.doi.org/10.3390/s23218736 |
_version_ | 1785135586433040384 |
---|---|
author | Gavra, Vlad Pop, Ovidiu A. Dobra, Ionut |
author_facet | Gavra, Vlad Pop, Ovidiu A. Dobra, Ionut |
author_sort | Gavra, Vlad |
collection | PubMed |
description | In recent times, the security of sensor networks, especially in the field of IoT, has become a priority. This article focuses on the security features of the Zigbee protocol in Xbee devices developed by Digi International, specifically in the Xbee 3 (XB3-24) devices. Using the TI LaunchXL-CC26X2R1 kit, we intercepted and analyzed packets in real-time using the Wireshark application. The study encompasses various stages of network formation, packet transmission and analysis of security key usage, considering scenarios as follows: without security, distributed security mode and centralized security mode. Our findings highlight the differences in security features of Xbee devices compared to the Zigbee protocol, validating and invalidating methods of establishing security keys, vulnerabilities, strengths, and recommended security measures. We also discovered that security features of the Xbee 3 devices are built around a global link key preconfigured therefore constituting a vulnerability, making those devices suitable for man-in-the-middle and reply attacks. This work not only elucidates the complexities of Zigbee security in Xbee devices but also provides direction for future research for authentication methods using asymmetric encryption algorithms such as digital signature based on RSA and ECDSA. |
format | Online Article Text |
id | pubmed-10649587 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2023 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-106495872023-10-26 A Comprehensive Analysis: Evaluating Security Characteristics of Xbee Devices against Zigbee Protocol Gavra, Vlad Pop, Ovidiu A. Dobra, Ionut Sensors (Basel) Article In recent times, the security of sensor networks, especially in the field of IoT, has become a priority. This article focuses on the security features of the Zigbee protocol in Xbee devices developed by Digi International, specifically in the Xbee 3 (XB3-24) devices. Using the TI LaunchXL-CC26X2R1 kit, we intercepted and analyzed packets in real-time using the Wireshark application. The study encompasses various stages of network formation, packet transmission and analysis of security key usage, considering scenarios as follows: without security, distributed security mode and centralized security mode. Our findings highlight the differences in security features of Xbee devices compared to the Zigbee protocol, validating and invalidating methods of establishing security keys, vulnerabilities, strengths, and recommended security measures. We also discovered that security features of the Xbee 3 devices are built around a global link key preconfigured therefore constituting a vulnerability, making those devices suitable for man-in-the-middle and reply attacks. This work not only elucidates the complexities of Zigbee security in Xbee devices but also provides direction for future research for authentication methods using asymmetric encryption algorithms such as digital signature based on RSA and ECDSA. MDPI 2023-10-26 /pmc/articles/PMC10649587/ /pubmed/37960436 http://dx.doi.org/10.3390/s23218736 Text en © 2023 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Article Gavra, Vlad Pop, Ovidiu A. Dobra, Ionut A Comprehensive Analysis: Evaluating Security Characteristics of Xbee Devices against Zigbee Protocol |
title | A Comprehensive Analysis: Evaluating Security Characteristics of Xbee Devices against Zigbee Protocol |
title_full | A Comprehensive Analysis: Evaluating Security Characteristics of Xbee Devices against Zigbee Protocol |
title_fullStr | A Comprehensive Analysis: Evaluating Security Characteristics of Xbee Devices against Zigbee Protocol |
title_full_unstemmed | A Comprehensive Analysis: Evaluating Security Characteristics of Xbee Devices against Zigbee Protocol |
title_short | A Comprehensive Analysis: Evaluating Security Characteristics of Xbee Devices against Zigbee Protocol |
title_sort | comprehensive analysis: evaluating security characteristics of xbee devices against zigbee protocol |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10649587/ https://www.ncbi.nlm.nih.gov/pubmed/37960436 http://dx.doi.org/10.3390/s23218736 |
work_keys_str_mv | AT gavravlad acomprehensiveanalysisevaluatingsecuritycharacteristicsofxbeedevicesagainstzigbeeprotocol AT popovidiua acomprehensiveanalysisevaluatingsecuritycharacteristicsofxbeedevicesagainstzigbeeprotocol AT dobraionut acomprehensiveanalysisevaluatingsecuritycharacteristicsofxbeedevicesagainstzigbeeprotocol AT gavravlad comprehensiveanalysisevaluatingsecuritycharacteristicsofxbeedevicesagainstzigbeeprotocol AT popovidiua comprehensiveanalysisevaluatingsecuritycharacteristicsofxbeedevicesagainstzigbeeprotocol AT dobraionut comprehensiveanalysisevaluatingsecuritycharacteristicsofxbeedevicesagainstzigbeeprotocol |