Skip to main content

Frying PAN: Dissecting Customized Protocol for Personal Area Network

  • Conference paper
Book cover Information Security Applications (WISA 2015)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 9503))

Included in the following conference series:

  • 1202 Accesses

Abstract

A spoofing attack for a wireless communication system is the most common attack method for unauthorized access and control. IEEE 802.15.4 is a standard that defines only physical and medium access control layers for low rate, low power, and low cost wireless systems. This standard is widely used as lower layers for not only several wireless communication standards but also customized protocols by manufacturers. However, security has not been considered seriously in these customized protocols, due to other important features including efficiency and cost. In this paper, in order to empirically analyze the real world threat in these systems, we chose to study three IEEE 802.15.4 based wireless communication systems as targets. We manually analyzed the customized protocols above IEEE 802.15.4 if there exist vulnerabilities to be exploited. For all three systems, we discover significant vulnerabilities. We implemented a spoofing attack for two targets, and we successfully controlled the targets by our spoofing attack. For the last target, we chose not to run the experiment due to significant safety reasons.

This research was supported by Next-Generation Information Computing Development Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Science, ICT & Future Planning (No. NRF-2014M3C4A7030648).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. IEEE Standard for Local, metropolitan area networks - Part 15.4: Low-Rate Wireless Personal Area Networks (LR-WPANs) (2011)

    Google Scholar 

  2. Sastry, N., Wagner, D.: Security considerations for IEEE 802.15.4 networks. In: WiSe. IEEE (2004)

    Google Scholar 

  3. Sokullu, R., Dagdeviren, O., Korkmar, I.: On the IEEE 802.15. 4 MAC layer attacks: GTS attack. In: SENSORCOMM. ACM (2008)

    Google Scholar 

  4. Jokar, P., Arianpoo, N., Leung, V.C.: Spoofing detection in IEEE 802.15.4 networks based on received signal strength. Ad Hoc Netw. 11(8), 2648–2660 (2013)

    Article  Google Scholar 

  5. Jokar, P., Arianpoo, N., Leung, V.C.: Spoofing prevention using received signal strength for ZigBee-based home area networks. In: SmartGridComm. IEEE (2013)

    Google Scholar 

  6. KillerBee. https://code.google.com/p/killerbee/

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yongdae Kim .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this paper

Cite this paper

Choi, K., Son, Y., Lee, J., Kim, S., Kim, Y. (2016). Frying PAN: Dissecting Customized Protocol for Personal Area Network. In: Kim, Hw., Choi, D. (eds) Information Security Applications. WISA 2015. Lecture Notes in Computer Science(), vol 9503. Springer, Cham. https://doi.org/10.1007/978-3-319-31875-2_25

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-31875-2_25

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-31874-5

  • Online ISBN: 978-3-319-31875-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics