skip to main content
10.1145/3384419.3430436acmconferencesArticle/Chapter ViewAbstractPublication PagessensysConference Proceedingsconference-collections
short-paper

Side-channel information leaks of Z-wave smart home IoT devices: demo abstract

Published:16 November 2020Publication History

ABSTRACT

Z-Wave is one of the key access protocols of the Internet of Things (IoT). It is highly popular in home automation and security system applications due to its minimum power consumption, reliability, and cost effectiveness. With an estimate of over 100 million deployed Z-Wave devices around the globe, it is essential to understand their security landscape. For instance, Z-Wave devices can leak personal information about the home dwellers as well as their possessions and buglers can use compromised Z-Wave devices to disable security systems or even to feed incorrect information. In this paper, we present an experiment setup and early results of side-channel information leaks of Z-Wave. We show that Z-Wave traffic despite being encrypted, leaks information through side-channels and an attacker who can passively capture Z-Wave frames by simply being in the vicinity of a house can identify Z-Wave devices inside the house.

References

  1. 2018. End of Year Z-Wave Ecosystem Report. https://z-wavealliance.org/z-wave-alliance-2018-end-of-year-z-wave-report/Google ScholarGoogle Scholar
  2. 2020. HackRF One. https://greatscottgadgets.com/hackrf/one/Google ScholarGoogle Scholar
  3. 2020. Z-Wave Sniffer Pro. https://gitlab.com/sajaljainsyd/Z-Wave-Sniffer-ProGoogle ScholarGoogle Scholar
  4. Leonardo Babun, Hidayet Aksu, Lucas Ryan, Kemal Akkaya, Elizabeth S Bentley, and A Selcuk Uluagac. 2020. Z-IoT: Passive Device-class Fingerprinting of ZigBee and Z-Wave IoT Devices. In IEEE International Conference on Communications.Google ScholarGoogle Scholar
  5. B. W. Ramsey B. E. Mullins C. W. Badenhop, S. R. Graham and L. O. Mailloux. 2017. The Z-Wave routing protocol and its security implications. In Computers Security.Google ScholarGoogle Scholar
  6. B. Fouladi and S. Ghanoun. 2013. Security Evaluation of the Z-Wave wireless protocol. In Black hat USA, Vol. 24. 1--2.Google ScholarGoogle Scholar
  7. J. D. Fuller and B. W. Ramsey. 2015. Rogue Z-Wave controllers: A persistent attack channel. In IEEE 40th Local ComputerNetworks Conference Workshops.Google ScholarGoogle Scholar
  8. Z. Taqvi I. Unwala and J. Lu. 2018. Iot security: Zwave and thread. In 2018 IEEE Green Technologies Conference (GreenTech). IEEE, 176--182.Google ScholarGoogle Scholar
  9. C MacGillivray and D Reinsel. 2019. Worldwide global datasphere IoT device and data forecast 2019--2023. Int. Data Corp.(IDC) (2019).Google ScholarGoogle Scholar
  10. A. Siemer P. Felke N. Boucif, F. Golchert and F. Gosewehr. [n.d.]. Crushing the wave-new z-wave vulnerabilities exposed. ([n. d.]). arXiv:2001.08497Google ScholarGoogle Scholar
  11. Tara Salman and Raj Jain. 2019. A survey of protocols and standards for internet of things. arXiv preprint arXiv:1903.11549 (2019).Google ScholarGoogle Scholar

Index Terms

  1. Side-channel information leaks of Z-wave smart home IoT devices: demo abstract

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Conferences
            SenSys '20: Proceedings of the 18th Conference on Embedded Networked Sensor Systems
            November 2020
            852 pages
            ISBN:9781450375900
            DOI:10.1145/3384419

            Copyright © 2020 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 16 November 2020

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • short-paper

            Acceptance Rates

            Overall Acceptance Rate174of867submissions,20%

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader