Crushing the Wave – new Z-Wave vulnerabilities exposed

01/23/2020
by   Noureddine Boucif, et al.
0

This paper describes two denial of service attacks against the Z-Wave protocol and their effects on smart home gateways. Both utilize modified unencrypted packets, which are used in the inclusion phase and during normal operation. These are the commands Nonce Get/S2 Nonce Get and Find Nodes In Range. This paper shows how both can be manipulated and used to block a Z-Wave gateway's communication processing which in turn disables the whole Z-Wave network connected to it

READ FULL TEXT

page 1

page 2

page 3

page 4

research
05/02/2022

S0-No-More: A Z-Wave NonceGet Denial of Service Attack utilizing included but offline NodeIDs

In this paper a vulnerability in the Z-Wave protocol specification, espe...
research
03/16/2017

Destructive Read by Wave Interference for Arbitration

With the advent of big data and deep learning, computation power has bec...
research
01/17/2023

Are Home Security Systems Reliable?

Home security systems have become increasingly popular since they provid...
research
11/26/2020

Estimator Model for Prediction of Power Output of Wave Farms Using Machine Learning Methods

The amount of power generated by a wave farm depends on the Wave Energy ...
research
03/05/2014

Artificial Neuron Modelling Based on Wave Shape

This paper describes a new model for an artificial neural network proces...
research
09/01/2018

Pillar Universities in Russia: The Rise of "the Second Wave"

The problem of identifying the leading universities in a country is rath...
research
11/10/2022

Can one hear the position of nodes?

Wave propagation through nodes and links of a network forms the basis of...

Please sign up or login with your details

Forgot password? Click here to reset