|
[1] Dr. Cédric LÉVY-BENCHETON (ENISA), M.E.D.E., Mr. Guillaume TÉTU (Trusted labs), Dr. Guillaume DUFAY (Trusted Labs), Dr. Mouhannad ALATTAR (Trusted Labs), Security and Resilience of Smart Home Environments. [2] Kolias, C., Kambourakis, G., Stavrou, A., Voas, J., DDoS in the IoT: Mirai and Other Botnets. Computer, 2017. 50(7): p. 80-84. [3] Ronen, E., Shamir, A., Weingarten, A., O’Flynn , C., IoT Goes Nuclear: Creating a ZigBee Chain Reaction. in 2017 IEEE Symposium on Security and Privacy (SP). 2017. [4] Morgner, P., Mattejat S., Benenson Z., Muller C., Armknecht F., Insecure to the Touch: Attacking ZigBee 3.0 via Touchlink Commissioning. 2017. 230- 240. [5] Yüksel, E., H. Riis Nielson, and F. Nielson, ZigBee-2007 Security Essentials. 2008. [6] Aju, O.G. and A. Ajasin. A Survey of ZigBee Wireless Sensor Network Technology: Topology, Applications and Challenges. 2015. [7] Olawumi, O., Haataja, K., Asikainen, M., Vidgren, N., Toivanen P., Three practical attacks against ZigBee security: Attack scenario definitions, practical experiments, countermeasures, and lessons learned. in 2014 14th International Conference on Hybrid Intelligent Systems. 2014. [8] ZigBee Specification, in ZigBee Document – 05-3474-21. 2015, ZigBee Alliance. [9] ZigBee Home Automation Public Application Porfile, in ZigBee Document 05- 3520-29. 2013, ZigBee Alliance. [10] InfoSecurity, M. An Overview of ZigBee Networks. Available from: https://www.mwrinfosecurity.com/our-thinking/an-overview-of-zigbee- networks/. [11] Dragomir, D., Gheorghe, L., Costea, S., Radovici, A., A Survey on Secure Communication Protocols for IoT Systems. in 2016 International Workshop on Secure Internet of Things (SIoT). 2016. [12] FIPS Pub 197, Advanced Encryption Standard (AES), Federal Information Processing Standards Publication 197, US Department of Commerce/N.I.S.T, Springfield, Virginia, November 26, 2001.; Available from: http://csrc.nist.gov/. [13] Fan, X., Susan, F., Long, W., Li, S. “Security Analysis of Zigbee”, MIT.edu, 2017 [14] Fox., B. ZigDiggity ZigBee hacking toolkit. 2018; Available from: https://github.com/BishopFox/zigdiggity. [15] Farha, F. and H. Chen, Mitigating replay attacks with ZigBee solutions. Network Security, 2018. 2018(1): p. 13-19. [16] Farahani, S., ZigBee Wireless Networks and Transceivers. 2008: Newnes. 360.
|