ZigBee Device Verification for Securing Industrial Control and Building Automation Systems
Document Type
Conference Proceeding
Publication Date
2013
Abstract
Improved wireless ZigBee network security provides a means to mitigate malicious network activity due to unauthorized devices. Security enhancement using RF-based features can augment conventional bit-level security approaches that are solely based on the MAC addresses of ZigBee devices. This paper presents a device identity verification process using RF fingerprints from like-model CC2420 2.4 GHz ZigBee device transmissions in operational indoor scenarios involving line-of-sight and through-wall propagation channels, as well as an anechoic chamber representing near-ideal conditions. A trained multiple discriminant analysis model was generated using normalized multivariate Gaussian test statistics from authorized network devices. Authorized device classification and ID verification were assessed using pre-classification Kolmogorov-Smirnov (KS) feature ranking and post-classification generalized relevance learning vector quantization improved (GRLVQI) relevance ranking. A true verification rate greater than 90% and a false verification rate less than 10% were obtained when assessing authorized device IDs. When additional rogue devices were introduced that attempted to gain unauthorized network access by spoofing the bit-level credentials of authorized devices, the KS-test feature set achieved a true verification rate greater than 90% and a rogue reject rate greater than 90% in 29 of 36 rogue scenarios while the GRLVQI feature set was successful in 28 of 36 scenarios. Abstract © Springer
DOI
10.1007/978-3-642-45330-4_4
Source Publication
IFIP Advances in Information and Communication Technology, vol. 417
Recommended Citation
Dubendorfer, C. K., Ramsey, B. W., & Temple, M. A. (2013). ZigBee device verification for securing industrial control and building automation systems. In J. W. Butts & S. Shenoi (Eds.), Critical Infrastructure Protection VII. ICCIP 2013 (pp. 47–62). Berlin: Springer. https://doi.org/10.1007/978-3-642-45330-4_4
Comments
The "Link to Full Text" on this page loads the PDF of the paper, furnished through the Springer Nature SharedIt content-sharing initiative.
Published by Springer as a work of the U.S. Federal government. Foreign copyrights may apply.
© IFIP International Federation for Information Processing 2013 (Outside the U.S.)