Kasutaja tarvikud

Lehe tööriistad


viited

Viited

  1. ZigBee Specification. (2008). ZigBee Document 053474r17, ZigBee Alliance.
  2. Farahani, S. (2008). ZigBee Wireless Networks and Transceivers. Oxford : Elsevier.
  3. Cache, J., Wright, J., Liu, V. (2010). Hacking Exposed Wireless: Wireless Security Secrets & Solutions. 2nd edition. New York [etc.] : McGraw-Hill.
  4. Johnstone, M., Jarvis, J. (2011). Penetration of ZigBee-based wireless sensor networks. – Proceedings of the 12th Australian Information Warfare and Security Conference : 5-7 December 2011, Perth, Australia, 17-23.
  5. Li, N., Zhang, N., Das, S., Thuraisingham, B. (2009). Privacy preservation in wireless sensor networks: A state-of-the-art survey. – Ad Hoc Networks, 7/2009, 1501-1514.
  6. Perrig, A., Tygar, J. (2003) Secure Broadcast Communication: in Wired and Wireless Networks. Norwell, MA, USA : Springer.
  7. Radmand, P., Domingo, M., Singh, J., Arnedo, J., Talevski, A., Petersen, S., Carlsen, S. (2010) ZigBee/ZigBee PRO Security Assessment Based on Compromised Cryptographic Keys. – International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC) : 4-6 November 2010, Fukuoka, Japan, 465-470
  8. Mangir, T., Sarakbi, L., Younan, H. (2011). Detecting Malicious Activities in ZigBee Networks using Cognitive Radio. – International Journal of Distributed and Parallel Systems, Vol.2, No.6, 51-61.
  9. Yüksel, E., Nielson, H., Nielson, F., Fruth, M., Kwiatkowska, M. (2010) Optimizing ZigBee Security using Stochastic Model Checking. – IMM-Technical Report-2010-08, DTU Informatics : Lyngby, Denmark.
  10. Brik, V., Banerjee, S., Gruteser, M., Oh, S. (2008). Wireless Device Identification with Radiometric Signatures. – The 14th Annual International Conference on Mobile Computing and Networking (MobiCom) : 14-19 September 2008, San Fransisco, California, USA, 116-127.
  11. Nguyen, N, Zheng, G., Han, Z, Zheng, R. (2011). Device Fingerprinting to Enhance Wireless Security using Nonparametric Bayesian Method. – The 30th IEEE International Conference on Computer Communications (IEEE INFOCOM) : 10-15 April 2011, Shanghai, China, 1404-1412.
  12. Ko, L., Lee, J. (2011) ZigBee Security for Residential Sensor Networks. – Smart Computing Review, Vol.1, No.2, 95-103.
  13. Masica, K. (2007). Recommended Practices For Securing ZigBee Wireless Networks in Process Control System Environments DRAFT. [WWW] https://ics-cert.us-cert.gov/sites/default/files/recommended_practices/Securing%20ZigBee%20Wireless%20Networks%20in%20Process%20Control%20System%20Environments.pdf (01.12.2012)
  14. Dini, G., Tiloca, M. (2010). Considerations on Security in ZigBee Networks. – IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (IEEE SUTC) : 7-9 June 2010, Newport Beach, CA, USA, 58-65.
  15. Karlof, C., Wagner, D. (2003) Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures. – Proceedings of the First IEEE Sensor Network Protocols and Applications : 11 May 2003, Berkeley, CA, USA, 113-127.
  16. Faria, D., Cheriton, D. (2006) Detecting Identity-Based Attacks in Wireless Networks Using Signalprints. – ACM Workshop on Wireless Security (WiSe) : 29 September 2006, Los Angeles, CA, USA, 43-52.
  17. Yüksel, E., Nielson, H., Nielson, F. (2011). A Secure Key Establishment Protocol for ZigBee Wireless Sensor Networks. – The Computer Journal, Vol.54, No.4, 589-601.
  18. Lee, G., Lim, J., Kim, D., Yang, S., Yoon, M. (2008). An Approach to Mitigating Sybil Attack in Wireless Networks using ZigBee. – The 10th International Conference on Advanced Communications Technology (ICACT) : 17-20 February 2008, 1005-1009.
  19. Sushma, Nandal, D., Nandal, V. (2011). Security Threats in Wireless Sensor Networks. – International Journal of Computer Science & Management Studies, Vol.11, No.1, 59-63.
  20. Raymond, D. (2008) Denial-of-Sleep Vulnerabilities in Wireless Sensor Network MAC Protocols: PhD thesis. Virginia Polytechnic Institute and State University, Blacksburg, Virginia, USA.
  21. Goodspeed, T., Bratus, S., Melgares, R., Shapiro, R., Speers, R. (2011). Packets in Packets: Orson Welles' In-Band Signaling Attacks for Modern Radios. – 5th USENIX Workshop on Offensive Technologies (WOOT) : 8 August 2011, San Francisco, CA, USA. [WWW] http://www.usenix.org/events/woot11/tech/final_files/Goodspeed.pdf (01.12.2012)
  22. Goodspeed, T. (2011). Practical attacks on the Freescale MC13224 ZigBee SoP – 9th Confidence 2011 : 24-25 May 2011, Krakow, Poland. [VIDEO][WWW] http://www.securitytube.net/video/3551 (01.12.2012)
  23. Goodspeed, T. (2009). Extracting Keys from Second Generation ZigBee Chips. – Black Hat USA 2009 : 25-30 July 2009, Las Vegas, Nevada, USA. [WWW] http://www.blackhat.com/presentations/bh-usa-09/GOODSPEED/BHUSA09-Goodspeed-ZigbeeChips-PAPER.pdf (01.12.2012)
  24. ZigBee Home Automation Public Application Profile. (2010). ZigBee Document 053520r26, ZigBee Alliance.
  25. Barker, E., Barker, W., Burr, W., Polk, W., Smid, M. (2007) Recommendation for Key Management – Part 1: General (Revised) – NIST Special Publication 800-57 March 2007.
  26. Sastry, N., Wagner, D. (2004) Security Considerations for IEEE 802.15.4 Networks. – ACM Workshop on Wireless Security (WiSe) : 1 October 2004 Philadelphia, Pennsylvania, USA, 43-52.
  27. Wilhelm, M., Martinovic, I., Schmitt, J., Lenders, V. (2011) Reactive Jamming in Wireless Networks – How Realistic is the Threat? – ACM Conference on Wireless Security (WiSe) : 14-17 June 2011, Hamburg, Germany. [WWW] http://www.lenders.ch/publications/conferences/wisec11.pdf (01.12.2012)
  28. Hall, J., Barbeau, M., Kranakis, E. (2004) Enhancing Intrusion Detection in Wireless Networks Using Radio Frequency Fingerprinting – Communications, Internet and Information Technology (CIIT) : 22-24 November 2004, St. Thomas, US Virgin Islands, 46-56.
  29. ZigBee Light Link User Guide. (2015). JN-UG-3091 Revision 1.2, NXP Laboratories
  30. Zillner, T., Strobl, S. (2015) ZigBee Exploited - The Good the Bad and the Ugly. – Black Hat USA 2015 : 6 August 2015, Las Vegas, Nevada, USA. [WWW] https://www.blackhat.com/docs/us-15/materials/us-15-Zillner-ZigBee-Exploited-The-Good-The-Bad-And-The-Ugly.pdf (07.08.2015)
Viimati muudetud 2015-08-07 Mait Peekma

Lehekülje tarvikud