Discipline: Technology and Engineering
Subcategory: Electrical Engineering
Latha Suryavanshi Mahadeva Rao - Morgan State University
Co-Author(s): Kevin Kornegay and Jumoke Ladeji-Osias, Morgan State University, Baltimore
The Internet of Things (IoT) is a dynamic network that extends internet connectivity to a wide range of everyday things and devices. These devices/things are capable of connecting to the Internet, have an IP address and can communicate with each other over wireless network. Today, Home Automation/Smart Home, a subset of IoT, is changing the way we live as it provides complete control of connected devices, appliances and things at home. Home Automation uses sensors for data collection and protocols like Zigbee, Z-Wave protocol for communication. Z-Wave is a proprietary wireless, low power and low cost protocol that enables reliable communication between all the Z-Wave enabled devices at home. Z-Wave devices offer interoperability and backwards compatibility of devices. Examples of Z-Wave devices include light dimmers, light switches, thermostats, door locks, security sensors and controllers. About 50 million Z-Wave devices from manufacturers who belong to the Z-Wave alliance have been already deployed and are expected to grow about 26 times by 2020. The proliferation of Z-Wave devices not only make ones life easier but pose information security challenges. Our research work entails the assessment of Z-Wave home automation vulnerabilities and proposes countermeasures. Devices sold as Z-wave compliant and available locally are used for the research. A home automation is setup with primary controller, light with on off switch, smart power meter, dimmer, door look and smoke detector. We propose to use different types of attacks like replay attack, Man-in the middle attack on the home automation setup. For launching attacks on the home automation system, we intercept the Z-Wave communications going on between the devices in home automation using EZ-Wave which is built on Scapy Radio framework. We plan build a sniffer and injector tool especially for this purpose. Attacks may also be launched by creating malicious devices that can communicate with the Z-Wave devices. We are currently working towards identifying vulnerabilities at the protocol level, deciphering communication between devices at packet level, set up and build sniffer and injector to launch a physical attack.
References: Security Evaluation of the Z-Wave Wireless Protocol B.Fouladi, S.Ghanoun SensePost UK
International Telecommunication Union (ITU). (1/2015).G.9959: Short range narrow-band digital radio communication transceivers – PHY and MAC layer specifications.
Sigma Designs Today’s IoT: Powered by Z-Wave Retrieved Oct 2016, from Sigma Designs public web site: http://www.sigmadesigns.com/internet-things-starts-home/
Sigma Designs Z-Wave development Kit. Retrieved Oct 2016, from Sigma Designs public web site: http://www.ztssigmadesigns.com/
Funder Acknowledgement(s): This material is based upon work supported by the National Science Foundation under Grant No. 1458930.
Faculty Advisor: Jumoke Ladeji-Osisas, jumoke.ladeji-osias@morgan.edu
Role: Setup of Sigma Design Software development kit, PC Controller, Zniffer, Keil compiler and verification of proper functionality by running sample designs. Setup of the EZ-Wave using Scapy Radio framework, contribute towards building a sniffer and injector tool, identifying vulnerabilities at the protocol level, deciphering communication between devices at packet level, launch a physical attack.