【24h】

Improved tools for indoor ZigBee warwalking

机译:用于室内ZigBee行走的改进工具

获取原文

摘要

Secure ZigBee wireless sensor and control networks use 128-bit AES encryption to defend against message sniffing and unauthorized access. However, the low cost and low complexity of ZigBee devices makes them vulnerable to physical attacks such as tampering and network key extraction. Network administrators and penetration testers require tools such as Zbfind to accurately locate ZigBee hardware and evaluate physical security. The open source Zbfind tool estimates distance to ZigBee devices in real time using received signal strength and a distance prediction model. We collect 4500 signal strength measurements along nine walking paths toward ZigBee transmitters in three office buildings. We find that the log-distance path loss model used by Zbfind predicts transmitter distance with 92.5% mean absolute percentage error. We construct an alternative linear model that reduces error to 21%.
机译:安全的ZigBee无线传感器和控制网络使用128位AES加密来防御消息嗅探和未经授权的访问。但是,ZigBee设备的低成本和低复杂性使其容易受到物理攻击,例如篡改和网络密钥提取。网络管理员和渗透测试人员需要使用诸如Zbfind之类的工具来准确定位ZigBee硬件并评估物理安全性。开源Zbfind工具使用接收到的信号强度和距离预测模型实时估计到ZigBee设备的距离。我们沿着通往3座办公大楼中ZigBee发射器的9条步行路径收集了4500信号强度测量值。我们发现Zbfind使用的对数距离路径损耗模型预测的发射机距离为92.5%的平均绝对百分比误差。我们构建了一个将误差降低到21%的替代线性模型。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号