flaw in the part of the protocol where smart-grid-enabled sensors join the network via the local
trust center. Recognizing this pattern of interest through manual inspection wasn’t a surprise.
As Mike Bond and Jolyon Clulow noted, “It remains rare that vulnerabilities are found purely
through automated analysis, as most analysts are highly-… We modeled a smart energy
device (SED) joining the ZigBee network. We provided the simulated attackers with knowledge …