Rogue Z-Wave Controllers: A Persistent Attack Channel

Document Type

Conference Proceeding

Publication Date

10-2015

Abstract

The popularity of Wireless Sensor Networks (WSN) is increasing in critical infrastructure, smart metering, and home automation. Of the numerous protocols available, Z-Wave has significant potential for growth in WSNs. As a proprietary protocol, there are few research publications concerning Z-Wave, and thus little is known about the security implications of its use. Z-Wave networks use a gateway controller to manage and control all devices. Vulnerabilities have been discovered in Z-Wave gateways, all of which rely on the gateway to be consistently connected to the Internet. The work herein introduces a new vulnerability that allows the injection of a rogue controller into the network. Once injected, the rogue controller maintains a stealthy, persistent communication channel with all inadequately defended devices. The severity of this type of attack warrants mitigation steps, presented herein. Abstract © IEEE.

Comments

The "Link to Full Text" button on this page loads the open access article, hosted at IEEE. The publisher retains permissions to re-use and distribute this article.

The linked article is subject to the following terms by the publisher: © 2015 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.

DOI

10.1109/LCNW.2015.7365922

Source Publication

2015 IEEE 40th Conference on Local Computer Networks (LCN)

Share

COinS