61
Our approach Risk analysis Code analysis Motes and network Traffic Cryptography Security of MICA*-based / ZigBee Wireless Sensor Networks Dan Cvrcek , Matt Lewis, and Frank Stajano Cambridge University Computer Lab and myself also Brno University of Technology Department of Intelligent Systems 28 December 2008 Dan Cvrcek , Matt Lewis, and Frank Stajano Attacks on MICA* Networks

Security of MICA*-based / ZigBee Wireless Sensor Networks

  • Upload
    others

  • View
    3

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Security of MICA*-based / ZigBee Wireless Sensor Networks

Our approachRisk analysis

Code analysisMotes and network

TrafficCryptography

Security of MICA*-based / ZigBeeWireless Sensor Networks

Dan Cvrcek, Matt Lewis, and Frank Stajano

Cambridge UniversityComputer Lab

and myself also

Brno University of TechnologyDepartment of Intelligent Systems

28 December 2008

Dan Cvrcek, Matt Lewis, and Frank Stajano Attacks on MICA* Networks

Page 2: Security of MICA*-based / ZigBee Wireless Sensor Networks

Our approachRisk analysis

Code analysisMotes and network

TrafficCryptography

Dan Cvrcek, Matt Lewis, and Frank Stajano Attacks on MICA* Networks

Page 3: Security of MICA*-based / ZigBee Wireless Sensor Networks

Our approachRisk analysis

Code analysisMotes and network

TrafficCryptography

Our approach

What we did1 Development of systems for monitoring large civil

structures2 Analysis of off-the-shelf products3 Interviewing owners and/or operators of the structures4 Implementing attacks

Dan Cvrcek, Matt Lewis, and Frank Stajano Attacks on MICA* Networks

Page 4: Security of MICA*-based / ZigBee Wireless Sensor Networks

Our approachRisk analysis

Code analysisMotes and network

TrafficCryptography

The kit

MICAz motes – purchased as part of a Xbow kitStargate – embedded Linux box with a MICAz connectorUSB programmers / receivers for MICAzHardware debugger – Atmel JTAG ICEVMware and serveral Linux/Win boxes

Most results applicable to Iris, Tmote, Intel Mote and Intel Mote2 devices.

They also use TinyOS software or its commercial versions.

Dan Cvrcek, Matt Lewis, and Frank Stajano Attacks on MICA* Networks

Page 5: Security of MICA*-based / ZigBee Wireless Sensor Networks

Our approachRisk analysis

Code analysisMotes and network

TrafficCryptography

Three-tier architecture

Your standard three-tier network topologyback-end system with database (off-site) Comms: ADSLwhere possible, GPRSmiddle: gateway (on-site) Comms: IEEE 802.15.4 / RS-232bottom: sensor nodes (multi-hop ad-hoc network)

Actual hardware componentsCrossbow backend system (with PostgreSQL database)Stargate (embedded Linux box as a gateway)Crossbow MICAz (802.15.4 motes)TinyOS 1.1 / XMesh (OS for MICAz motes)

Dan Cvrcek, Matt Lewis, and Frank Stajano Attacks on MICA* Networks

Page 6: Security of MICA*-based / ZigBee Wireless Sensor Networks

Our approachRisk analysis

Code analysisMotes and network

TrafficCryptography

The myth of smart dust . . . and security

Dan Cvrcek, Matt Lewis, and Frank Stajano Attacks on MICA* Networks

Page 7: Security of MICA*-based / ZigBee Wireless Sensor Networks

Our approachRisk analysis

Code analysisMotes and network

TrafficCryptography

The myth of smart dust . . . and security

Dan Cvrcek, Matt Lewis, and Frank Stajano Attacks on MICA* Networks

Page 8: Security of MICA*-based / ZigBee Wireless Sensor Networks

Our approachRisk analysis

Code analysisMotes and network

TrafficCryptography

The myth of smart dust . . . and security

Dan Cvrcek, Matt Lewis, and Frank Stajano Attacks on MICA* Networks

Page 9: Security of MICA*-based / ZigBee Wireless Sensor Networks

Our approachRisk analysis

Code analysisMotes and network

TrafficCryptography

The myth of smart dust . . . and security

Dan Cvrcek, Matt Lewis, and Frank Stajano Attacks on MICA* Networks

Page 10: Security of MICA*-based / ZigBee Wireless Sensor Networks

Our approachRisk analysis

Code analysisMotes and network

TrafficCryptography

Dan Cvrcek, Matt Lewis, and Frank Stajano Attacks on MICA* Networks

Page 11: Security of MICA*-based / ZigBee Wireless Sensor Networks

Our approachRisk analysis

Code analysisMotes and network

TrafficCryptography

Security properties – by civil structures’ operators

What the operators wantConfidentiality

Not really an issue (bridge, underground)Do not rule encryption out but use it by default

AvailabilityBecomes critical if used be quick response mechanismsReliability is however a basic requirement

What stroke us was that managers we talked to were not ableto predict future applications.However, overloading existing infrastructures was common(answers to direct questions).

Dan Cvrcek, Matt Lewis, and Frank Stajano Attacks on MICA* Networks

Page 12: Security of MICA*-based / ZigBee Wireless Sensor Networks

Our approachRisk analysis

Code analysisMotes and network

TrafficCryptography

Security properties

Short-term integrityFalse negatives – hard to exploit if only few true positives!False positives – more disruptive; but viewed with suspicion

Medium-term integrityMonth-scale analysis helps budgetting for maintenancecostsContinuous monitoring gives quantitative answers

Long-term integrity ( up to 100+ years)Scale of decades: allows previously impossible researchThe most valuable dataSystem to be designed for portability and continuousupgrades

Dan Cvrcek, Matt Lewis, and Frank Stajano Attacks on MICA* Networks

Page 13: Security of MICA*-based / ZigBee Wireless Sensor Networks

Our approachRisk analysis

Code analysisMotes and network

TrafficCryptography

Attackers / Risks

This is for now(imagine a future when you can use ZigBee networks to . . . )

Terorists?No, they will target bridges and tunnels directly

Competitors, resourceful attackers?Not likely

Curious hackersPossibly, to play a bit with the technology

Dan Cvrcek, Matt Lewis, and Frank Stajano Attacks on MICA* Networks

Page 14: Security of MICA*-based / ZigBee Wireless Sensor Networks

Our approachRisk analysis

Code analysisMotes and network

TrafficCryptography

Attackers / Risks

Risk of attacks – not amplified by WSN.

But may be differnet for water pipes.

It is quite easy to get through a pad lock.

Dan Cvrcek, Matt Lewis, and Frank Stajano Attacks on MICA* Networks

Page 15: Security of MICA*-based / ZigBee Wireless Sensor Networks

Our approachRisk analysis

Code analysisMotes and network

TrafficCryptography

Attackers / Risks

Risk of attacks – not amplified by WSN.

But may be differnet for water pipes.

It is quite easy to get through a pad lock.

Dan Cvrcek, Matt Lewis, and Frank Stajano Attacks on MICA* Networks

Page 16: Security of MICA*-based / ZigBee Wireless Sensor Networks

Our approachRisk analysis

Code analysisMotes and network

TrafficCryptography

Classes of attacks

Three basic attack classesRemote attacks – from the InternetVicinity attacks – wireless, within communication rangePhysical attacks – physical access to targeted devices

Physical attacks are difficult to do (Becher, Benenson, andDorseif in 2006)

What about just connecting to a mote’s connector??

Dan Cvrcek, Matt Lewis, and Frank Stajano Attacks on MICA* Networks

Page 17: Security of MICA*-based / ZigBee Wireless Sensor Networks

Our approachRisk analysis

Code analysisMotes and network

TrafficCryptography

Classes of attacks

Three basic attack classesRemote attacks – from the InternetVicinity attacks – wireless, within communication rangePhysical attacks – physical access to targeted devices

Physical attacks are difficult to do (Becher, Benenson, andDorseif in 2006)

What about just connecting to a mote’s connector??

Dan Cvrcek, Matt Lewis, and Frank Stajano Attacks on MICA* Networks

Page 18: Security of MICA*-based / ZigBee Wireless Sensor Networks

Our approachRisk analysis

Code analysisMotes and network

TrafficCryptography

Code analysis – why?

Dan Cvrcek, Matt Lewis, and Frank Stajano Attacks on MICA* Networks

Page 19: Security of MICA*-based / ZigBee Wireless Sensor Networks

Our approachRisk analysis

Code analysisMotes and network

TrafficCryptography

XMesh – commercial variant of TinyOS

Disassemble XMesh code (15k ASM lines)and use variable names from TinyOS

if (pTable-> flags&NBRFLAG_VALID){if (pTable->flag&NBRFLAG_VALID) && (pTable->parent != TOS_LOCAL_ADDRESS)

&&(pTable->parent!=-1) && (pTable->cost !=-1)&& (pTable->childLiveliness==0))computeCost(pTable->cost, pTable->sendEst, pTable->receiveEst,

ulNbrLinkCost, ulNbrTotalCost);if (pTable==gpCurrentParent){pOldParent=pTable;oldParentCost=ulNbrTotalCost;oldParentLinkCost=ulNbrLinkCost;

} else {if (ulNbrTotalCost < ulMinTotalCost){ulMinTotalCost = ulNbrTotalCost;pNewParent = pTable;

}}

Dan Cvrcek, Matt Lewis, and Frank Stajano Attacks on MICA* Networks

Page 20: Security of MICA*-based / ZigBee Wireless Sensor Networks

Our approachRisk analysis

Code analysisMotes and network

TrafficCryptography

Routing metrics

Routing is based on1 link cost – ratio of successfully received / sent messages2 route cost – sum of link costs to a gateway

The basis of all computations are message counters1 XMesh does not include counters into data messages

Dan Cvrcek, Matt Lewis, and Frank Stajano Attacks on MICA* Networks

Page 21: Security of MICA*-based / ZigBee Wireless Sensor Networks

Our approachRisk analysis

Code analysisMotes and network

TrafficCryptography

Function UpdateNbrCounters

sDelta = seqNo - pNbr->seqNo - 1if (seqNo!=1) {

sDelta-- //the only change from TinyOS}if (sDelta >= 0) {

pNbr->missed+=sDeltapNbr->received++

} else { // sDelta was < 0if (sDelta < -20) {

// forget and reinitialise the record} else {

return TRUE}

pNbr->lastSeqNo = seqNo

Dan Cvrcek, Matt Lewis, and Frank Stajano Attacks on MICA* Networks

Page 22: Security of MICA*-based / ZigBee Wireless Sensor Networks

Our approachRisk analysis

Code analysisMotes and network

TrafficCryptography

XComand vulnerability

XCommand featureXbow’s extension of TinyOSDirect commands from a gateway to all / selected motesNo routing but broadcast instead

How to stop rebroadcasting? Messages have msgIDsEach mote keeps internal counter (e.g., moteCntr)Mote does not process if moteCntr ≥ msgID

The problem is moteCntr is not the last seen msgID butthe number of processed XCommand messages

Dan Cvrcek, Matt Lewis, and Frank Stajano Attacks on MICA* Networks

Page 23: Security of MICA*-based / ZigBee Wireless Sensor Networks

Our approachRisk analysis

Code analysisMotes and network

TrafficCryptography

XComand vulnerability

XCommand featureXbow’s extension of TinyOSDirect commands from a gateway to all / selected motesNo routing but broadcast instead

How to stop rebroadcasting? Messages have msgIDsEach mote keeps internal counter (e.g., moteCntr)Mote does not process if moteCntr ≥ msgID

The problem is moteCntr is not the last seen msgID butthe number of processed XCommand messages

Dan Cvrcek, Matt Lewis, and Frank Stajano Attacks on MICA* Networks

Page 24: Security of MICA*-based / ZigBee Wireless Sensor Networks

Our approachRisk analysis

Code analysisMotes and network

TrafficCryptography

Attacks

Dan Cvrcek, Matt Lewis, and Frank Stajano Attacks on MICA* Networks

Page 25: Security of MICA*-based / ZigBee Wireless Sensor Networks

Our approachRisk analysis

Code analysisMotes and network

TrafficCryptography

Hardware limits

Memory is limited⇒ all data structures are size-limited!CountersTablesCrypto information

Not always necessary

Dan Cvrcek, Matt Lewis, and Frank Stajano Attacks on MICA* Networks

Page 26: Security of MICA*-based / ZigBee Wireless Sensor Networks

Our approachRisk analysis

Code analysisMotes and network

TrafficCryptography

Jamming

Jamming

Power used by attacker power wasted by victim

Or can it be used for “smart” attacks?

Dan Cvrcek, Matt Lewis, and Frank Stajano Attacks on MICA* Networks

Page 27: Security of MICA*-based / ZigBee Wireless Sensor Networks

Our approachRisk analysis

Code analysisMotes and network

TrafficCryptography

Jamming

Jamming

Power used by attacker > power wasted by victim

Or can it be used for “smart” attacks?

Dan Cvrcek, Matt Lewis, and Frank Stajano Attacks on MICA* Networks

Page 28: Security of MICA*-based / ZigBee Wireless Sensor Networks

Our approachRisk analysis

Code analysisMotes and network

TrafficCryptography

Jamming

Jamming

Power used by attacker = power wasted by victim

Or can it be used for “smart” attacks?

Dan Cvrcek, Matt Lewis, and Frank Stajano Attacks on MICA* Networks

Page 29: Security of MICA*-based / ZigBee Wireless Sensor Networks

Our approachRisk analysis

Code analysisMotes and network

TrafficCryptography

Jamming

Jamming

Power used by attacker < power wasted by victim

Or can it be used for “smart” attacks?

Dan Cvrcek, Matt Lewis, and Frank Stajano Attacks on MICA* Networks

Page 30: Security of MICA*-based / ZigBee Wireless Sensor Networks

Our approachRisk analysis

Code analysisMotes and network

TrafficCryptography

Jamming

Jamming

Power used by attacker << power wasted by victim

Or can it be used for “smart” attacks?

Dan Cvrcek, Matt Lewis, and Frank Stajano Attacks on MICA* Networks

Page 31: Security of MICA*-based / ZigBee Wireless Sensor Networks

Our approachRisk analysis

Code analysisMotes and network

TrafficCryptography

Jamming

Jamming

Power used by attacker power wasted by victim

Or can it be used for “smart” attacks?

Dan Cvrcek, Matt Lewis, and Frank Stajano Attacks on MICA* Networks

Page 32: Security of MICA*-based / ZigBee Wireless Sensor Networks

Our approachRisk analysis

Code analysisMotes and network

TrafficCryptography

Jamming

Dan Cvrcek, Matt Lewis, and Frank Stajano Attacks on MICA* Networks

Page 33: Security of MICA*-based / ZigBee Wireless Sensor Networks

Our approachRisk analysis

Code analysisMotes and network

TrafficCryptography

Selective jamming

Jamming always possible – no newsMore interesting – selective jamming

Jam packets from mote XJam packets for mote YJam packets of type ZJam packets with content C

Simple but effective implementationcompile criterion into attacking mote’s codeDeploy the mote and let it listenIf a message meets the criterion, jam

Dan Cvrcek, Matt Lewis, and Frank Stajano Attacks on MICA* Networks

Page 34: Security of MICA*-based / ZigBee Wireless Sensor Networks

Our approachRisk analysis

Code analysisMotes and network

TrafficCryptography

Low cost selective jamming

Can we use just one mote to listen and jam selectively?Problem – IEEE 802.15.4 radio chips work over buffers.

Dan Cvrcek, Matt Lewis, and Frank Stajano Attacks on MICA* Networks

Page 35: Security of MICA*-based / ZigBee Wireless Sensor Networks

Our approachRisk analysis

Code analysisMotes and network

TrafficCryptography

Low cost selective jamming

Solution – debug mode

Dan Cvrcek, Matt Lewis, and Frank Stajano Attacks on MICA* Networks

Page 36: Security of MICA*-based / ZigBee Wireless Sensor Networks

Our approachRisk analysis

Code analysisMotes and network

TrafficCryptography

Low cost selective jamming

The final code well below 100 lines of NesC (C macrolanguage)

Jamming – transmitting fixed bytes on the same channel.

Dan Cvrcek, Matt Lewis, and Frank Stajano Attacks on MICA* Networks

Page 37: Security of MICA*-based / ZigBee Wireless Sensor Networks

Our approachRisk analysis

Code analysisMotes and network

TrafficCryptography

Dan Cvrcek, Matt Lewis, and Frank Stajano Attacks on MICA* Networks

Page 38: Security of MICA*-based / ZigBee Wireless Sensor Networks

Our approachRisk analysis

Code analysisMotes and network

TrafficCryptography

Dan Cvrcek, Matt Lewis, and Frank Stajano Attacks on MICA* Networks

Page 39: Security of MICA*-based / ZigBee Wireless Sensor Networks

Our approachRisk analysis

Code analysisMotes and network

TrafficCryptography

Dan Cvrcek, Matt Lewis, and Frank Stajano Attacks on MICA* Networks

Page 40: Security of MICA*-based / ZigBee Wireless Sensor Networks

Our approachRisk analysis

Code analysisMotes and network

TrafficCryptography

Protection?

Dan Cvrcek, Matt Lewis, and Frank Stajano Attacks on MICA* Networks

Page 41: Security of MICA*-based / ZigBee Wireless Sensor Networks

Our approachRisk analysis

Code analysisMotes and network

TrafficCryptography

Routing table manipulation

XMesh nodes broadcast neighbour lists with link qualityinfoNodes update own routing tables by according tomessages (no crypto)Scapy extension to manipulate/inject messagesOne cen indirectly rewrite routing table of victim

“Sleep deprivation attack”1 Create a routing loop between two victims2 Watch them zip messages back and forth (if you want)3 Let them drain batteries (duty cycle < 1 %→ >> 10 %)

Dan Cvrcek, Matt Lewis, and Frank Stajano Attacks on MICA* Networks

Page 42: Security of MICA*-based / ZigBee Wireless Sensor Networks

Our approachRisk analysis

Code analysisMotes and network

TrafficCryptography

Frame formats

Dan Cvrcek, Matt Lewis, and Frank Stajano Attacks on MICA* Networks

Page 43: Security of MICA*-based / ZigBee Wireless Sensor Networks

Our approachRisk analysis

Code analysisMotes and network

TrafficCryptography

Msg replays - counter overflow

Messages rejected if the msg counter < expected valueBUTIf the msg counter > expected value, it will be accepted(also if msg counter = NOUGHT)

Counter size – 16 bits⇒ let’s cause overflowInject fake message the victim will forward(data msgs no counter)Create a routing loop (quickly eating up counter values)Jam ACK frames – the victim will retransmit

Combine any of the three.

Or, as the routing table size is 16,just add as many new neighbours.

Dan Cvrcek, Matt Lewis, and Frank Stajano Attacks on MICA* Networks

Page 44: Security of MICA*-based / ZigBee Wireless Sensor Networks

Our approachRisk analysis

Code analysisMotes and network

TrafficCryptography

Msg replays - counter overflow

Messages rejected if the msg counter < expected valueBUTIf the msg counter > expected value, it will be accepted(also if msg counter = NOUGHT)

Counter size – 16 bits⇒ let’s cause overflowInject fake message the victim will forward(data msgs no counter)Create a routing loop (quickly eating up counter values)Jam ACK frames – the victim will retransmit

Combine any of the three.

Or, as the routing table size is 16,just add as many new neighbours.

Dan Cvrcek, Matt Lewis, and Frank Stajano Attacks on MICA* Networks

Page 45: Security of MICA*-based / ZigBee Wireless Sensor Networks

Our approachRisk analysis

Code analysisMotes and network

TrafficCryptography

Traffic analysis

Dan Cvrcek, Matt Lewis, and Frank Stajano Attacks on MICA* Networks

Page 46: Security of MICA*-based / ZigBee Wireless Sensor Networks

Our approachRisk analysis

Code analysisMotes and network

TrafficCryptography

The exterior

Dan Cvrcek, Matt Lewis, and Frank Stajano Attacks on MICA* Networks

Page 47: Security of MICA*-based / ZigBee Wireless Sensor Networks

Our approachRisk analysis

Code analysisMotes and network

TrafficCryptography

Network topology

Dan Cvrcek, Matt Lewis, and Frank Stajano Attacks on MICA* Networks

Page 48: Security of MICA*-based / ZigBee Wireless Sensor Networks

Our approachRisk analysis

Code analysisMotes and network

TrafficCryptography

Network topology over 24 hours

Dan Cvrcek, Matt Lewis, and Frank Stajano Attacks on MICA* Networks

Page 49: Security of MICA*-based / ZigBee Wireless Sensor Networks

Our approachRisk analysis

Code analysisMotes and network

TrafficCryptography

What can one play with

Traffic analysis allowsTopology – never encryptedRoutes to gateway – partially encryptedData – encrypted

Dan Cvrcek, Matt Lewis, and Frank Stajano Attacks on MICA* Networks

Page 50: Security of MICA*-based / ZigBee Wireless Sensor Networks

Our approachRisk analysis

Code analysisMotes and network

TrafficCryptography

Cryptography

Dan Cvrcek, Matt Lewis, and Frank Stajano Attacks on MICA* Networks

Page 51: Security of MICA*-based / ZigBee Wireless Sensor Networks

Our approachRisk analysis

Code analysisMotes and network

TrafficCryptography

What is out there?

TinySec – crypto library allowing encryption and MACing

Only MICA2 motes – not ZigBee motes

We had to port TinySec for MICAz motes first!RF chip⇔ [ Tx/Rx↔ TinySec↔ Tx/Rx↔ Processing ]↔ - 1 byte for MICA2 (868/916 MHz RF)↔ - 1 frame for MICAz (2.4GHz / 802.15.4 RF)

Dan Cvrcek, Matt Lewis, and Frank Stajano Attacks on MICA* Networks

Page 52: Security of MICA*-based / ZigBee Wireless Sensor Networks

Our approachRisk analysis

Code analysisMotes and network

TrafficCryptography

What is out there?

TinySec – crypto library allowing encryption and MACing

Only MICA2 motes – not ZigBee motes

We had to port TinySec for MICAz motes first!RF chip⇔ [ Tx/Rx↔ TinySec↔ Tx/Rx↔ Processing ]↔ - 1 byte for MICA2 (868/916 MHz RF)↔ - 1 frame for MICAz (2.4GHz / 802.15.4 RF)

Dan Cvrcek, Matt Lewis, and Frank Stajano Attacks on MICA* Networks

Page 53: Security of MICA*-based / ZigBee Wireless Sensor Networks

Our approachRisk analysis

Code analysisMotes and network

TrafficCryptography

Types of cryptographic problems

Correctness of implementationComputational limitationsUsage limits / errors

Dan Cvrcek, Matt Lewis, and Frank Stajano Attacks on MICA* Networks

Page 54: Security of MICA*-based / ZigBee Wireless Sensor Networks

Our approachRisk analysis

Code analysisMotes and network

TrafficCryptography

Implementation errors

Processing of eight-bytes block: CBC-MAC

for (i = 0; i < msgLen; i++) {// unrollpartial[pos++] ^= msg[i];if (pos == 7) {

if (!call BlockCipher.encrypt(&context->cc, partial, partial)) {

return FAIL;}pos = 0;

}

Dan Cvrcek, Matt Lewis, and Frank Stajano Attacks on MICA* Networks

Page 55: Security of MICA*-based / ZigBee Wireless Sensor Networks

Our approachRisk analysis

Code analysisMotes and network

TrafficCryptography

Hardware limits for crypto

Personally, I don’t think there are any.

TinyOSMAC length 4 bytesPower efficient symmetric ciphersPublic key cryptography?

Power consumption of computations v communicationMAC overhead, synchronisation, . . .

Dan Cvrcek, Matt Lewis, and Frank Stajano Attacks on MICA* Networks

Page 56: Security of MICA*-based / ZigBee Wireless Sensor Networks

Our approachRisk analysis

Code analysisMotes and network

TrafficCryptography

Hardware limits for crypto

Personally, I don’t think there are any.

TinyOSMAC length 4 bytesPower efficient symmetric ciphersPublic key cryptography?

Power consumption of computations v communicationMAC overhead, synchronisation, . . .

Dan Cvrcek, Matt Lewis, and Frank Stajano Attacks on MICA* Networks

Page 57: Security of MICA*-based / ZigBee Wireless Sensor Networks

Our approachRisk analysis

Code analysisMotes and network

TrafficCryptography

Cryptographic boundary

TinySec is excellent because it’s transparent for gateway

Different treatment of wireless and wired interfaces

Dan Cvrcek, Matt Lewis, and Frank Stajano Attacks on MICA* Networks

Page 58: Security of MICA*-based / ZigBee Wireless Sensor Networks

Our approachRisk analysis

Code analysisMotes and network

TrafficCryptography

A few words from Xbow

A few points from communication with XbowOur customers are universities (i.e., they only want to play)We agree that security issues highlighted must be solvedWe are not interested in security until we have customers

Project webpage:

http://www.cl.cam.ac.uk/research/security/sensornets/

Dan Cvrcek, Matt Lewis, and Frank Stajano Attacks on MICA* Networks

Page 59: Security of MICA*-based / ZigBee Wireless Sensor Networks

Our approachRisk analysis

Code analysisMotes and network

TrafficCryptography

A few words from Xbow

A few points from communication with XbowOur customers are universities (i.e., they only want to play)We agree that security issues highlighted must be solvedWe are not interested in security until we have customers

Project webpage:

http://www.cl.cam.ac.uk/research/security/sensornets/

Dan Cvrcek, Matt Lewis, and Frank Stajano Attacks on MICA* Networks

Page 60: Security of MICA*-based / ZigBee Wireless Sensor Networks

Our approachRisk analysis

Code analysisMotes and network

TrafficCryptography

A few words from Xbow

A few points from communication with XbowOur customers are universities (i.e., they only want to play)We agree that security issues highlighted must be solvedWe are not interested in security until we have customers

Project webpage:

http://www.cl.cam.ac.uk/research/security/sensornets/

Dan Cvrcek, Matt Lewis, and Frank Stajano Attacks on MICA* Networks

Page 61: Security of MICA*-based / ZigBee Wireless Sensor Networks

Our approachRisk analysis

Code analysisMotes and network

TrafficCryptography

Dan Cvrcek, Matt Lewis, and Frank Stajano Attacks on MICA* Networks