Preview

Nt1310 Unit 3 Summary

Good Essays
Open Document
Open Document
734 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Nt1310 Unit 3 Summary
Although Zigbee implements a wide assortment of security measures, there are still a variety of vulnerabilities and attack methods that can be used. These attacks and how they can be carried out will be described in this Section. The first and possibly easiest attack to implement is the denial of service attack. These types of attacks overload the network such that service is denied to the network’s end users. In a typical wired network this is accomplished by having a huge number nodes simultaneously requesting data from a server. The server will not be able to process all of the requests and valid requests will be dropped. In Zigbee networks this attack is made significantly easier because Zigbee operates in the wireless domain. Valid users can be denied service to the network simply by creating noise on the wireless channel. This noise creates errors in …show more content…

Although the Zigbee protocol implements the Advanced Encryption Standard (AES) protocol the initial key exchange is not protected against sniffing. The network keys are often exchanged in plain text or are encoded using the default factory key. Consequently, if an attacker were to sniff the initial exchange of packets, that attacker would be able to gain access to the network keys and the entire network. The difficulty with this type of attack is that the key exchange only occurs when a new node registers with the network. After this initial exchange all packets are encoded. The trick for these types of attacks, is forcing the network to enter an initialization state. This can be accomplished by creating RF interference that will result in dropped packets. After a certain number of dropped packets a wireless node will think that it has lost connection to the network and will try to reconnect. Then when this occurs the network key can be sniffed. These types of attacks have been carried out by a large number of security researchers [6, 7, 8, 9,

You May Also Find These Documents Helpful

  • Good Essays

    Nt1310 Unit 8.1 Summary

    • 346 Words
    • 2 Pages

    The final device is an Arduino-based ball sorter that uses a two-stage approach to sorting the balls. The device starts by isolating a single ball and measuring its weight. Afterwards, the device categorizes the ball based on the measured weight and deposits it in the appropriate receptacle.…

    • 346 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Nt1310 Unit 3 Research

    • 489 Words
    • 2 Pages

    e. One thing all Ethernet networks have in common is their access method, known as…

    • 489 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Nt1320 Unit 3

    • 355 Words
    • 2 Pages

    |(2) A perfect square is a number whose square root is a whole number. For example, 25 and 64 are prefect squares since √25 = 5 and √64 = 8 are both whole numbers.…

    • 355 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Nt1310 Unit 4 Assignment

    • 1851 Words
    • 8 Pages

    RESEARCH MAN-IN-THE MIDDLE ATTACKS IN ETHERNET WIFI. DESCRIBE HOW THEY ARE IMPLEMENTED AND HOW THEY CAN BE PREVENTED.…

    • 1851 Words
    • 8 Pages
    Powerful Essays
  • Satisfactory Essays

    It-242 Wlan Check Point

    • 265 Words
    • 2 Pages

    There are several ways a person can go about securing a wireless local area network, or WLAN. One of the best ways in my opinion is to not broadcast the network publicly. This does not prevent people from accessing the network, but instead prevents the network from being visible to others. A person searching for a network to connect to can easily see your network exists. Without broadcasting the network people that are not aware of your network have no way of even knowing it is there. Another way to help to secure a WLAN is by using MAC address filtering. MAC filtering requires a list of the valid MAC addresses the user wants to be able to access the network. Any computer with a MAC address that is not on the provided list will not be able to gain access to the network. These steps alone are not enough to keep a network secure but when used with other security measures such as strong passwords and encryption can make a network a lot less accessible from malicious outsiders. These individuals can be a bothersome hindrance stealing network bandwidth or far more dangerous individuals that intend to cause harm with malicious programs or viruses or to steal private information. A wireless network may never be completely secure, but it is always best practice to use as many security steps as possible to insure the safety of the data on the network.…

    • 265 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    remote access it255

    • 345 Words
    • 2 Pages

    • The power of access points will be turned down to a minimum that still allows…

    • 345 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Power Grid

    • 1857 Words
    • 5 Pages

    Chen, P.-Y., Cheng, S.-M., & Chen, K.-C. (2012). Smart Attacks in Smart Grid Communication Networks. IEEE Communications Magazine, 50(8), 24-29.…

    • 1857 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Transmissions over wireless networks can be intercepted by any suitable device within the transmission radius. If a network intruder is able to attach to an unsecured AP, they can get access to the wireless network and the Internet connection.…

    • 689 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Josh

    • 6922 Words
    • 28 Pages

    References: 1. Andrea Bittau, Mark Handley, and Joshua Lackey. The final nail in WEP’s coffin. In IEEE Symposium on Security and Privacy, pages 386–400. IEEE Computer Society, 2006. 2. Nikita Borisov, Ian Goldberg, and David Wagner. Intercepting mobile communications: the insecurity of 802.11. In ACM MobiCom 2001, pages 180–189. ACM Press, 2001. 3. Rafik Chaabouni. Break WEP faster with statistical analysis. Technical report, EPFL, LASEC, June 2006. http://lasecwww.epfl.ch/pub/lasec/doc/cha06. pdf. 4. Stefan D¨rh¨fer. Empirische Untersuchungen zur WLAN-Sicherheit mittels o o Wardriving. Diplomarbeit, RWTH Aachen, September 2006. (in German).…

    • 6922 Words
    • 28 Pages
    Good Essays
  • Powerful Essays

    In wireless networks the security concerns are considered an important issue, various techniques are used for that purpose. Traditional security mechanisms (authentication, encryption) provide an abstract level of security but some reactive security mechanisms and deep level of inspection is always required. Here some basic intrusion detection systems are discussed and analyzed, and we have shown the advantages and limitations of each technique through a specific comparison between that techniques. And finally we have talked in some details about the HawkEye IDS and we have shown its architecture and mechanism of work, and talked about its advantages over the other IDS we have discussed.…

    • 4430 Words
    • 18 Pages
    Powerful Essays
  • Powerful Essays

    This paper will discuss the Wireless Ethernet product produced by Cisco, the Aironet 3500 wireless access point. The Aironet 3500 access points are designed for installation into areas of wireless frequency saturation. They are an ideal solution for businesses, hospitals and universities plagued by interference devices such as microwave ovens, rogue devices such as phones and digital tablets. Universities can take advantage of the technology by deploying the APs on dorm floors knowing they have the capability to classify the myriad of devices students bring to campus which would normally congest the wireless network.…

    • 1599 Words
    • 7 Pages
    Powerful Essays
  • Powerful Essays

    CEAACK MANET Analysis

    • 1970 Words
    • 8 Pages

    This unstable nature of wireless networks cannot be stated as an excuse for slack security measures .Vulnerable or not the data transmitted must maintain its integrity and the confidentiality of the sender. Authentication and authorization are the two faces of data security which otherwise can be interpreted as the integrity and confidentiality of data. This dual aspect of security is only possible with the inclusion of strong cryptographic techniques that can safeguard the transmitted data with virtually unbreakable cryptographic codes that helps the network to secure itself against…

    • 1970 Words
    • 8 Pages
    Powerful Essays
  • Powerful Essays

    Zigbee is PAN technology based on the IEEE 802.15.4 standard. Unlike Bluetooth or wireless USB devices, zigbee devices have the ability to form a mesh network between nodes. Meshing is a type of daisy chaining from one device to another. This technique allows the short range of an individual node to be expanded and multiplied, covering a much larger area.…

    • 12661 Words
    • 51 Pages
    Powerful Essays
  • Powerful Essays

    Wireless Sensor Network

    • 15813 Words
    • 64 Pages

    [26]”An Efficient Authentication Strategy for Reprogramming of Sensor Networks” Jin Tan, JinTan Chen, YanQiu Liu, 2007 International Conference on Computational Intelligence and Security, 2007 IEEE.…

    • 15813 Words
    • 64 Pages
    Powerful Essays
  • Powerful Essays

    Compared to Bluetooth, ZigBee provides higher network flexibility and a larger number of nodes, and a better transmission range with low power consumption. Recently, ZigBee-based wireless networks were tested in various applications. In [8], the authors investigate the use of ZigBee and mobile phones in monitoring elderly patients with diabetes mellitus or heart diseases. A ZigBee WiMAX nursery system for patient monitoring was proposed in [9]. An interesting application of ZigBee-based wireless sensor nodes in the real-time monitoring of fruit logistics is discussed in [10]. The work presented here simply attempts to probe into the applicability, usefulness, and practicality of using wireless-ZigBee based network in monitoring the signs of patients on a hospital floor and surrounding area without confining them to a bed. The presented solution is meant to be both simple, cost effective and hopefully causes minimal interference with the patient’s mobility and comfort. A wearable sensor unit, attached to the patient’s body, reads and transmits the patient’s fetal…

    • 2358 Words
    • 10 Pages
    Powerful Essays