Securing the ZigBee protocol in the smart grid

AP Melaragno, D Bandara, D Wijesekera… - Computer, 2012 - ieeexplore.ieee.org
Computer, 2012ieeexplore.ieee.org
… Through manual inspection of these formal models, we recognized a well-known security
flaw in the part of the protocol where smart-grid-enabled sensors join the network via the local
trust center. Recognizing this pattern of interest through manual inspection wasn’t a surprise.
As Mike Bond and Jolyon Clulow noted, “It remains rare that vulnerabilities are found purely
through automated analysis, as most analysts are highly-… We modeled a smart energy
device (SED) joining the ZigBee network. We provided the simulated attackers with knowledge …
The design-implement-fix process is sufficient for previously unknown attack vectors. However, engineers should use established knowledge, such as known attack patterns, in the analysis of security protocols prior to their acceptance and implementation.
ieeexplore.ieee.org
以上显示的是最相近的搜索结果。 查看全部搜索结果