Visible to the public Principles of Secure BootStrapping for IoTConflict Detection Enabled

PI: Ninghui Li; Researchers: Syed Hussain (Post Doc), Weicheng Wang (Graduate Student)

HARD PROBLEM(S) ADDRESSED
This refers to Hard Problems, released November 2012.

Policy.

PUBLICATIONS
Papers written as a result of your research from the current quarter only.

None in the current quarter.

KEY HIGHLIGHTS

  • We have studied the security and privacy issues in the Zigbee protocol. In order to design a systematic analysis of the protocol, we first extracted the finite state machine (FSM) of the ZigBee end-device, the controller, and the router from the ZigBee specification. We then analyzed the FSM and found a number of potential design vulnerabilities and corresponding exploitations.

COMMUNITY ENGAGEMENTS

  • Isaac Lammers, a high school student who worked on this project, won multiple awards for his research in this project. His project presentation, titled "WiFi Deauthorization: Pentesting Network Security" won Intel Excellence in Computer Science award.

EDUCATIONAL ADVANCES: