By Topic

Improved tools for indoor ZigBee warwalking

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)
Ramsey, B.W. ; Dept. of Electr. & Comput. Eng., Air Force Inst. of Technol., Wright-Patterson AFB, OH, USA ; Mullins, B.E. ; White, E.D.

Secure ZigBee wireless sensor and control networks use 128-bit AES encryption to defend against message sniffing and unauthorized access. However, the low cost and low complexity of ZigBee devices makes them vulnerable to physical attacks such as tampering and network key extraction. Network administrators and penetration testers require tools such as Zbfind to accurately locate ZigBee hardware and evaluate physical security. The open source Zbfind tool estimates distance to ZigBee devices in real time using received signal strength and a distance prediction model. We collect 4500 signal strength measurements along nine walking paths toward ZigBee transmitters in three office buildings. We find that the log-distance path loss model used by Zbfind predicts transmitter distance with 92.5% mean absolute percentage error. We construct an alternative linear model that reduces error to 21%.

Published in:

Local Computer Networks Workshops (LCN Workshops), 2012 IEEE 37th Conference on

Date of Conference:

22-25 Oct. 2012