Principles of Secure BootStrapping for IoT
PI: Ninghui Li; Researchers: Syed Hussain (Post Doc), Weicheng Wang (Graduate Student)
HARD PROBLEM(S) ADDRESSED
This refers to Hard Problems, released November 2012.
Policy.
PUBLICATIONS
Papers written as a result of your research from the current quarter only.
None in the current quarter.
KEY HIGHLIGHTS
- We have studied the security and privacy issues in the Zigbee protocol. In order to design a systematic analysis of the protocol, we first extracted the finite state machine (FSM) of the ZigBee end-device, the controller, and the router from the ZigBee specification. We then analyzed the FSM and found a number of potential design vulnerabilities and corresponding exploitations.
COMMUNITY ENGAGEMENTS
- Isaac Lammers, a high school student who worked on this project, won multiple awards for his research in this project. His project presentation, titled "WiFi Deauthorization: Pentesting Network Security" won Intel Excellence in Computer Science award.
EDUCATIONAL ADVANCES:
Groups: