Nt1310 Unit 3

Words: 428
Pages: 2

Although the Zigbee protocol was built with security in mind there are still a wide variety of attack methods that can be used to interfere with, sniff, or exploit the network. These methods can result in the disruption of network service, the release of sensitive data, or the manipulation of physical devices. Defense measures can be taken to protect these networks by ensuring that the Zigbee network is segmented from the rest of the network. Ensuring that all security features are enabled. These include access control, data encryption, frame integrity, and sequential freshness. Providing secure, tamper resistant encloses for all physical devices. Finally, if possible, the network should be preconfigured for security by setting the network keys, pan id, and link keys prior to deployment. If these measures are implemented most of the attack methods can be avoided. …show more content…
The first change I would make is the use of asymmetric key exchange. Most Zigbee implementation simply send the key in the open or encrypted using the default key. This is an easy target for attacks. If asymmetric key exchange using a random key is used, the key will also be secured. The down side is that the key exchange will take longer. Implementing this will be able to prevent many of the current Zigbee attack methods.
Another improvement could be the introduction of directional antennas, so that spatial division multiple access (SDMA) can be used. Using this technique, can more effectively reject interference from potential attackers and it can also prevent some of the routing attacks.
I.