Security survey of the IoT wireless protocols
- 1 November 2017
- conference paper
- conference paper
- Published by Institute of Electrical and Electronics Engineers (IEEE) in 2017 25th Telecommunication Forum (TELFOR)
Abstract
With the increasing usage and impact of the services based on data from Internet of Things (IoT) networks, securing the sources as well as the transport of these data is crucial. In this paper, we present our survey of the security of the four widely used IoT protocols: Bluetooth Low Energy, LoRaWAN, ZigBee and Z-Wave. We discuss various vulnerabilities in the protocols and how the protocols evolved from the security point of view. The survey is a base for our future work on a secure gateway for IoT networks. In this project we are going to detect security incidents in IoT networks at the gateway connecting the IoT devices with the application servers.Keywords
This publication has 6 references indexed in Scilit:
- Exploring the Security Vulnerabilities of LoRaPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2017
- IoT Goes Nuclear: Creating a ZigBee Chain ReactionPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2017
- Security Analysis of LoRaWAN Join Procedure for Internet of Things NetworksPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2017
- On practical selective jamming of Bluetooth Low Energy advertisingPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2016
- Ghost-in-ZigBee: Energy Depletion Attack on ZigBee-Based Wireless NetworksIEEE Internet of Things Journal, 2016
- Rogue Z-Wave controllers: A persistent attack channelPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2015