• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

ZigBee 3.0网络安全挑战的综合分析

A Comprehensive Analysis of Security Challenges in ZigBee 3.0 Networks.

作者信息

Ghobakhlou Akbar, Al-Hamid Duaa Zuhair, Zandi Sara, Cato James

机构信息

Department of Data Science and Artificial Intelligence, Auckland University of Technology (AUT), Auckland 1010, New Zealand.

Department of Computer and Information Sciences, Auckland University of Technology (AUT), Auckland 1010, New Zealand.

出版信息

Sensors (Basel). 2025 Jul 25;25(15):4606. doi: 10.3390/s25154606.

DOI:10.3390/s25154606
PMID:40807786
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC12349651/
Abstract

ZigBee, a wireless technology standard for the Internet of Things (IoT) devices based on IEEE 802.15.4, faces significant security challenges that threaten the confidentiality, integrity, and availability of its networks. Despite using 128-bit Advanced Encryption Standard (AES) with symmetric keys for node authentication and data confidentiality, ZigBee's design constraints, such as low cost and low power, have allowed security issues to persist. While ZigBee 3.0 introduces enhanced security features such as install codes and trust centre link key updates, there remains a lack of empirical research evaluating their effectiveness in real-world deployments. This research addresses the gap by conducting a comprehensive, hardware-based analysis of ZigBee 3.0 networks using XBee 3 radio modules and ZigBee-compatible devices. We investigate the following three core security issues: (a) the security of symmetric keys, focusing on vulnerabilities that could allow attackers to obtain these keys; (b) the impact of compromised symmetric keys on network confidentiality; and (c) susceptibility to Denial-of-Service (DoS) attacks due to insufficient protection mechanisms. Our experiments simulate realistic attack scenarios under both Centralised and Distributed Security Models to assess the protocol's resilience. The findings reveal that while ZigBee 3.0 improves upon earlier versions, certain vulnerabilities remain exploitable. We also propose practical security controls and best practices to mitigate these attacks and enhance network security. This work contributes novel insights into the operational security of ZigBee 3.0, offering guidance for secure IoT deployments and advancing the understanding of protocol-level defences in constrained environments.

摘要

ZigBee是一种基于IEEE 802.15.4的物联网(IoT)设备无线技术标准,面临着重大的安全挑战,这些挑战威胁到其网络的保密性、完整性和可用性。尽管ZigBee使用128位高级加密标准(AES)和对称密钥进行节点认证和数据保密,但其设计限制,如低成本和低功耗,使得安全问题依然存在。虽然ZigBee 3.0引入了增强的安全功能,如安装代码和信任中心链接密钥更新,但仍缺乏实证研究来评估它们在实际部署中的有效性。本研究通过使用XBee 3无线电模块和ZigBee兼容设备对ZigBee 3.0网络进行全面的基于硬件的分析,解决了这一差距。我们研究了以下三个核心安全问题:(a)对称密钥的安全性,重点关注可能使攻击者获取这些密钥的漏洞;(b)受损对称密钥对网络保密性的影响;(c)由于保护机制不足而容易受到拒绝服务(DoS)攻击的情况。我们的实验在集中式和分布式安全模型下模拟现实的攻击场景,以评估该协议的弹性。研究结果表明,虽然ZigBee 3.0在早期版本的基础上有所改进,但某些漏洞仍然可以被利用。我们还提出了实际的安全控制措施和最佳实践,以减轻这些攻击并增强网络安全性。这项工作为ZigBee 3.0的操作安全性提供了新的见解,为安全的物联网部署提供了指导,并增进了对受限环境中协议级防御的理解。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0cbe/12349651/c989c0f4f7cc/sensors-25-04606-g015.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0cbe/12349651/1ec8f29a4d59/sensors-25-04606-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0cbe/12349651/f963d0a8f363/sensors-25-04606-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0cbe/12349651/3b9dfd91bcc4/sensors-25-04606-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0cbe/12349651/7768d0cbf91f/sensors-25-04606-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0cbe/12349651/51ab58fc7cf0/sensors-25-04606-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0cbe/12349651/bbf9e30f00c4/sensors-25-04606-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0cbe/12349651/8008d37061a1/sensors-25-04606-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0cbe/12349651/3203c4bcf179/sensors-25-04606-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0cbe/12349651/350d517ca3d8/sensors-25-04606-g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0cbe/12349651/e982ccac8ea4/sensors-25-04606-g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0cbe/12349651/0ad7e1a8b87b/sensors-25-04606-g011.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0cbe/12349651/aaf9fd99081d/sensors-25-04606-g012.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0cbe/12349651/7fd08ba69b5d/sensors-25-04606-g013.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0cbe/12349651/d01eebcc79d7/sensors-25-04606-g014.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0cbe/12349651/c989c0f4f7cc/sensors-25-04606-g015.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0cbe/12349651/1ec8f29a4d59/sensors-25-04606-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0cbe/12349651/f963d0a8f363/sensors-25-04606-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0cbe/12349651/3b9dfd91bcc4/sensors-25-04606-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0cbe/12349651/7768d0cbf91f/sensors-25-04606-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0cbe/12349651/51ab58fc7cf0/sensors-25-04606-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0cbe/12349651/bbf9e30f00c4/sensors-25-04606-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0cbe/12349651/8008d37061a1/sensors-25-04606-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0cbe/12349651/3203c4bcf179/sensors-25-04606-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0cbe/12349651/350d517ca3d8/sensors-25-04606-g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0cbe/12349651/e982ccac8ea4/sensors-25-04606-g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0cbe/12349651/0ad7e1a8b87b/sensors-25-04606-g011.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0cbe/12349651/aaf9fd99081d/sensors-25-04606-g012.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0cbe/12349651/7fd08ba69b5d/sensors-25-04606-g013.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0cbe/12349651/d01eebcc79d7/sensors-25-04606-g014.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0cbe/12349651/c989c0f4f7cc/sensors-25-04606-g015.jpg

相似文献

1
A Comprehensive Analysis of Security Challenges in ZigBee 3.0 Networks.ZigBee 3.0网络安全挑战的综合分析
Sensors (Basel). 2025 Jul 25;25(15):4606. doi: 10.3390/s25154606.
2
Prescription of Controlled Substances: Benefits and Risks管制药品的处方:益处与风险
3
IAESR: IoT-oriented authenticated encryption based on iShadow round function.IAESR:基于iShadow轮函数的面向物联网的认证加密
PeerJ Comput Sci. 2025 Jun 11;11:e2947. doi: 10.7717/peerj-cs.2947. eCollection 2025.
4
Enhancing anomaly detection and prevention in Internet of Things (IoT) using deep neural networks and blockchain based cyber security.利用基于深度神经网络和区块链的网络安全增强物联网(IoT)中的异常检测与预防。
Sci Rep. 2025 Jul 1;15(1):22369. doi: 10.1038/s41598-025-04164-4.
5
Enabling by voice: an exploratory study on how interactive smart agents (ISAs) can change the design of environmental control (EC) equipment and service.语音启用:关于交互式智能代理(ISA)如何改变环境控制(EC)设备及服务设计的探索性研究。
Disabil Rehabil Assist Technol. 2025 Jul 23:1-30. doi: 10.1080/17483107.2025.2530195.
6
Cross-Layer Analysis of Machine Learning Models for Secure and Energy-Efficient IoT Networks.用于安全且节能的物联网网络的机器学习模型的跨层分析
Sensors (Basel). 2025 Jun 13;25(12):3720. doi: 10.3390/s25123720.
7
Influence of Human Factors on Cyber Security within Healthcare Organisations: A Systematic Review.人为因素对医疗机构网络安全的影响:系统综述。
Sensors (Basel). 2021 Jul 28;21(15):5119. doi: 10.3390/s21155119.
8
Technology-enabled CONTACT tracing in care homes in the COVID-19 pandemic: the CONTACT non-randomised mixed-methods feasibility study.新冠疫情期间养老院中基于技术的接触者追踪:CONTACT非随机混合方法可行性研究
Health Technol Assess. 2025 May;29(24):1-24. doi: 10.3310/UHDN6497.
9
Accreditation through the eyes of nurse managers: an infinite staircase or a phenomenon that evaporates like water.护士长眼中的认证:是无尽的阶梯还是如流水般消逝的现象。
J Health Organ Manag. 2025 Jun 30. doi: 10.1108/JHOM-01-2025-0029.
10
A service-oriented microservice framework for differential privacy-based protection in industrial IoT smart applications.一种面向服务的微服务框架,用于工业物联网智能应用中基于差分隐私的保护。
Sci Rep. 2025 Aug 9;15(1):29230. doi: 10.1038/s41598-025-15077-7.

本文引用的文献

1
A Comprehensive Analysis: Evaluating Security Characteristics of Xbee Devices against Zigbee Protocol.全面分析:评估Xbee设备针对Zigbee协议的安全特性
Sensors (Basel). 2023 Oct 26;23(21):8736. doi: 10.3390/s23218736.
2
Enhancing Security in ZigBee Wireless Sensor Networks: A New Approach and Mutual Authentication Scheme for D2D Communication.增强ZigBee无线传感器网络的安全性:一种用于设备到设备通信的新方法和相互认证方案。
Sensors (Basel). 2023 Jun 19;23(12):5703. doi: 10.3390/s23125703.