Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

What's your protocol: Vulnerabilities and security threats related to Z-Wave protocol

Full metadata record
DC Field Value Language
dc.contributor.authorKim, Kyounggon-
dc.contributor.authorCho, Kiyoon-
dc.contributor.authorLim, Jihwan-
dc.contributor.authorJung, Young Ho-
dc.contributor.authorSung, Min Seok-
dc.contributor.authorKim, Seong Beom-
dc.contributor.authorKim, Huy Kang-
dc.date.accessioned2021-08-30T20:17:53Z-
dc.date.available2021-08-30T20:17:53Z-
dc.date.created2021-06-19-
dc.date.issued2020-07-
dc.identifier.issn1574-1192-
dc.identifier.urihttps://scholar.korea.ac.kr/handle/2021.sw.korea/54826-
dc.description.abstractWith the evolution of state-of-the-art applications and paradigms, the world is progressing toward smart cities. Smart homes are an important aspect of smart cities, wherein various mobile computing and network technologies are used. However, they are also susceptible to security threats that can cause serious issues related to privacy and safety. Z-Wave is a wireless technology primarily used in smart homes; however, its protocol has not been sufficiently investigated. In this study, we examined threat modeling for the Z-Wave protocol to determine the security issues and suggested attack scenarios in which we gained full control over the commercial products that implement Z-Wave. We analyzed the level 2 data flow diagram of actual products. The experimental results revealed that the major products that implement Z-Wave have several vulnerabilities. A video demonstrating our experimental result can be found at https://youtu.be/sM-NlJexDPU. (C) 2020 Elsevier B.V. All rights reserved.-
dc.languageEnglish-
dc.language.isoen-
dc.publisherELSEVIER-
dc.titleWhat's your protocol: Vulnerabilities and security threats related to Z-Wave protocol-
dc.typeArticle-
dc.contributor.affiliatedAuthorKim, Huy Kang-
dc.identifier.doi10.1016/j.pmcj.2020.101211-
dc.identifier.scopusid2-s2.0-85086737374-
dc.identifier.wosid000559024800001-
dc.identifier.bibliographicCitationPERVASIVE AND MOBILE COMPUTING, v.66-
dc.relation.isPartOfPERVASIVE AND MOBILE COMPUTING-
dc.citation.titlePERVASIVE AND MOBILE COMPUTING-
dc.citation.volume66-
dc.type.rimsART-
dc.type.docTypeArticle-
dc.description.journalClass1-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalResearchAreaTelecommunications-
dc.relation.journalWebOfScienceCategoryComputer Science, Information Systems-
dc.relation.journalWebOfScienceCategoryTelecommunications-
dc.subject.keywordAuthorZ-Wave-
dc.subject.keywordAuthorWireless sensor networks-
dc.subject.keywordAuthorThreat modeling-
dc.subject.keywordAuthorIoT-
dc.subject.keywordAuthorSmart home-
dc.subject.keywordAuthorSmart city-
Files in This Item
There are no files associated with this item.
Appears in
Collections
School of Cyber Security > Department of Information Security > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetrics

Total Views & Downloads

BROWSE