{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,11]],"date-time":"2025-11-11T15:49:48Z","timestamp":1762876188637,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":32,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,7,8]],"date-time":"2020-07-08T00:00:00Z","timestamp":1594166400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100009226","name":"National Security Agency","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100009226","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,7,8]]},"DOI":"10.1145\/3395351.3399349","type":"proceedings-article","created":{"date-parts":[[2020,7,22]],"date-time":"2020-07-22T04:29:10Z","timestamp":1595392150000},"page":"133-143","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["Analyzing the attack landscape of Zigbee-enabled IoT systems and reinstating users' privacy"],"prefix":"10.1145","author":[{"given":"Weicheng","family":"Wang","sequence":"first","affiliation":[{"name":"Purdue University"}]},{"given":"Fabrizio","family":"Cicala","sequence":"additional","affiliation":[{"name":"Purdue University"}]},{"given":"Syed Rafiul","family":"Hussain","sequence":"additional","affiliation":[{"name":"Purdue University"}]},{"given":"Elisa","family":"Bertino","sequence":"additional","affiliation":[{"name":"Purdue University"}]},{"given":"Ninghui","family":"Li","sequence":"additional","affiliation":[{"name":"Purdue University"}]}],"member":"320","published-online":{"date-parts":[[2020,7,21]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Efficient and Secure ECDSA Algorithm and its Applications: A Survey. arXiv preprint arXiv:1902.10313","author":"Al-Zubaidie Mishall","year":"2019","unstructured":"Mishall Al-Zubaidie , Zhongwei Zhang , and Ji Zhang . 2019. Efficient and Secure ECDSA Algorithm and its Applications: A Survey. arXiv preprint arXiv:1902.10313 ( 2019 ). Mishall Al-Zubaidie, Zhongwei Zhang, and Ji Zhang. 2019. Efficient and Secure ECDSA Algorithm and its Applications: A Survey. arXiv preprint arXiv:1902.10313 (2019)."},{"key":"e_1_3_2_1_2_1","unstructured":"ZigBee Alliance. 2015. ZigBee Document 05-3474-21. Technical Report. ZigBee Alliance.  ZigBee Alliance. 2015. ZigBee Document 05-3474-21. Technical Report. ZigBee Alliance."},{"key":"e_1_3_2_1_3_1","unstructured":"Zigbee Alliance. 2020. WHY Leading companies choose Zigbee. https:\/\/zigbeealliance.org\/  Zigbee Alliance. 2020. WHY Leading companies choose Zigbee. https:\/\/zigbeealliance.org\/"},{"key":"e_1_3_2_1_4_1","unstructured":"batteryequivalents.com. 2020. Lithium CR2477 Battery - Equivalents and Replacements. https:\/\/www.batteryequivalents.com\/lithium-cr2477-battery-equivalents-and-replacements.html  batteryequivalents.com. 2020. Lithium CR2477 Battery - Equivalents and Replacements. https:\/\/www.batteryequivalents.com\/lithium-cr2477-battery-equivalents-and-replacements.html"},{"key":"e_1_3_2_1_5_1","unstructured":"Ana Bera. 2019. 80 IoT Statistics (Infographic). https:\/\/safeatlast.co\/blog\/iot-statistics\/  Ana Bera. 2019. 80 IoT Statistics (Infographic). https:\/\/safeatlast.co\/blog\/iot-statistics\/"},{"key":"e_1_3_2_1_6_1","volume-title":"An Efficient Cryptographic Protocol Verifier Based on Prolog Rules. In 14th IEEE Computer Security Foundations Workshop (CSFW-14)","author":"Blanchet Bruno","year":"2001","unstructured":"Bruno Blanchet . 2001 . An Efficient Cryptographic Protocol Verifier Based on Prolog Rules. In 14th IEEE Computer Security Foundations Workshop (CSFW-14) . IEEE Computer Society, Cape Breton, Nova Scotia, Canada, 82--96. Bruno Blanchet. 2001. An Efficient Cryptographic Protocol Verifier Based on Prolog Rules. In 14th IEEE Computer Security Foundations Workshop (CSFW-14). IEEE Computer Society, Cape Breton, Nova Scotia, Canada, 82--96."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1155\/2013\/608380"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICOIN.2012.6164409"},{"key":"e_1_3_2_1_9_1","unstructured":"Nilanjan Dey Parikshit N Mahalle Pathan Mohd Shafi Vinod V Kimabahune and Aboul Ella Hassanien. [n.d.]. Internet of Things Smart Computing and Technology: A Roadmap Ahead. ([n. d.]).  Nilanjan Dey Parikshit N Mahalle Pathan Mohd Shafi Vinod V Kimabahune and Aboul Ella Hassanien. [n.d.]. Internet of Things Smart Computing and Technology: A Roadmap Ahead. ([n. d.])."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1983.1056650"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"Donald Eastlake and Paul Jones. 2001. US secure hash algorithm 1 (SHA1).  Donald Eastlake and Paul Jones. 2001. US secure hash algorithm 1 (SHA1).","DOI":"10.17487\/rfc3174"},{"key":"e_1_3_2_1_12_1","unstructured":"GE. 2017. ZigbeeFAQ. https:\/\/products.gecurrent.com\/sites\/products.currentbyge.com\/files\/documents\/document_file\/DT302-daintree-zigbee-security.pdf  GE. 2017. ZigbeeFAQ. https:\/\/products.gecurrent.com\/sites\/products.currentbyge.com\/files\/documents\/document_file\/DT302-daintree-zigbee-security.pdf"},{"key":"e_1_3_2_1_13_1","unstructured":"Drew Gislason. 2008. Commissioning ZigBee Networks. https:\/\/www.sciencedirect.com\/science\/article\/pii\/B9780750685979000082  Drew Gislason. 2008. Commissioning ZigBee Networks. https:\/\/www.sciencedirect.com\/science\/article\/pii\/B9780750685979000082"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICACCI.2016.7732296"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","first-page":"67","DOI":"10.30684\/etj.37.3B.1","article-title":"Security Improve in ZigBee Protocol Based on RSA Public Algorithm in WSN","volume":"37","author":"Hassan Nabaa A","year":"2019","unstructured":"Nabaa A Hassan and Alaa K Farhan . 2019 . Security Improve in ZigBee Protocol Based on RSA Public Algorithm in WSN . Engineering and Technology Journal 37 , 3 B (2019), 67 -- 73 . Nabaa A Hassan and Alaa K Farhan. 2019. Security Improve in ZigBee Protocol Based on RSA Public Algorithm in WSN. Engineering and Technology Journal 37, 3 B (2019), 67--73.","journal-title":"Engineering and Technology Journal"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.camwa.2012.03.044"},{"key":"e_1_3_2_1_17_1","volume-title":"International journal of information security 1, 1","author":"Johnson Don","year":"2001","unstructured":"Don Johnson , Alfred Menezes , and Scott Vanstone . 2001. The elliptic curve digital signature algorithm (ECDSA) . International journal of information security 1, 1 ( 2001 ), 36--63. Don Johnson, Alfred Menezes, and Scott Vanstone. 2001. The elliptic curve digital signature algorithm (ECDSA). International journal of information security 1, 1 (2001), 36--63."},{"key":"e_1_3_2_1_18_1","unstructured":"Silicon Labs. 2019. AN1089: Using Installation Codes with Zigbee Devices. Available at https:\/\/www.silabs.com\/documents\/public\/application-notes\/an1089-using-installation-codes-with-zigbee-devices.pdf.  Silicon Labs. 2019. AN1089: Using Installation Codes with Zigbee Devices. Available at https:\/\/www.silabs.com\/documents\/public\/application-notes\/an1089-using-installation-codes-with-zigbee-devices.pdf."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/358790.358797"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30182-0_29"},{"volume-title":"23rd {USENIX} Security Symposium ({USENIX} Security 14). 465--479.","author":"Li Zhiwei","key":"e_1_3_2_1_21_1","unstructured":"Zhiwei Li , Warren He , Devdatta Akhawe , and Dawn Song . 2014. The emperor's new password manager: Security analysis of web-based password managers . In 23rd {USENIX} Security Symposium ({USENIX} Security 14). 465--479. Zhiwei Li, Warren He, Devdatta Akhawe, and Dawn Song. 2014. The emperor's new password manager: Security analysis of web-based password managers. In 23rd {USENIX} Security Symposium ({USENIX} Security 14). 465--479."},{"key":"e_1_3_2_1_22_1","unstructured":"@MayaZigBee. 2015. https:\/\/twitter.com\/mayazigbee?lang=en Twitter.  @MayaZigBee. 2015. https:\/\/twitter.com\/mayazigbee?lang=en Twitter."},{"volume-title":"Advances in Cryptology --- CRYPTO '85 Proceedings, Hugh C","author":"Miller Victor S.","key":"e_1_3_2_1_23_1","unstructured":"Victor S. Miller . 1986. Use of Elliptic Curves in Cryptography . In Advances in Cryptology --- CRYPTO '85 Proceedings, Hugh C . Williams (Ed.). Springer Berlin Heidelberg , Berlin, Heidelberg , 417--426. Victor S. Miller. 1986. Use of Elliptic Curves in Cryptography. In Advances in Cryptology --- CRYPTO '85 Proceedings, Hugh C. Williams (Ed.). Springer Berlin Heidelberg, Berlin, Heidelberg, 417--426."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1002\/dac.2893"},{"key":"e_1_3_2_1_25_1","unstructured":"Ettus Research. 2019. USRP B210. https:\/\/www.ettus.com\/all-products\/UB210-KIT\/  Ettus Research. 2019. USRP B210. https:\/\/www.ettus.com\/all-products\/UB210-KIT\/"},{"key":"e_1_3_2_1_26_1","unstructured":"riverloopsecurity. 2019. APIMOTE. https:\/\/www.riverloopsecurity.com\/projects\/apimote\/  riverloopsecurity. 2019. APIMOTE. https:\/\/www.riverloopsecurity.com\/projects\/apimote\/"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.14"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2018.01.003"},{"key":"e_1_3_2_1_29_1","volume-title":"LiKe: Lightweight Certificateless Key Agreement for Secure IoT Communications","author":"Tedeschi Pietro","year":"2019","unstructured":"Pietro Tedeschi , Savio Sciancalepore , Areej Eliyan , and Roberto Di Pietro . 2019. LiKe: Lightweight Certificateless Key Agreement for Secure IoT Communications . IEEE Internet of Things Journal ( 2019 ). Pietro Tedeschi, Savio Sciancalepore, Areej Eliyan, and Roberto Di Pietro. 2019. LiKe: Lightweight Certificateless Key Agreement for Secure IoT Communications. IEEE Internet of Things Journal (2019)."},{"key":"e_1_3_2_1_30_1","first-page":"342","article-title":"Efficient Certificateless Authentication and Key Agreement (CL-AK) for Grid Computing","volume":"7","author":"Wang Shengbao","year":"2008","unstructured":"Shengbao Wang , Zhenfu Cao , and Haiyong Bao . 2008 . Efficient Certificateless Authentication and Key Agreement (CL-AK) for Grid Computing . IJ Network Security 7 , 3 (2008), 342 -- 347 . Shengbao Wang, Zhenfu Cao, and Haiyong Bao. 2008. Efficient Certificateless Authentication and Key Agreement (CL-AK) for Grid Computing. IJ Network Security 7, 3 (2008), 342--347.","journal-title":"IJ Network Security"},{"key":"e_1_3_2_1_31_1","unstructured":"Atmel MCU Wireless. 2015. AT03663: Power Consumption of ZigBee End Device. https:\/\/www.digikey.nl\/en\/pdf\/a\/atmel\/power-consumption-of-zigbee-end-device  Atmel MCU Wireless. 2015. AT03663: Power Consumption of ZigBee End Device. https:\/\/www.digikey.nl\/en\/pdf\/a\/atmel\/power-consumption-of-zigbee-end-device"},{"key":"e_1_3_2_1_32_1","volume-title":"ZigBee exploited: The good, the bad and the ugly. Black Hat---2015: https:\/\/www.blackhat.com\/docs\/us-15\/materials\/us-15-Zillner-ZigBee-Exploited-The-Good-The-Bad-And-The-Ugly.pdf","author":"Zillner Tobias","year":"2015","unstructured":"Tobias Zillner and S Strobl . 2015. ZigBee exploited: The good, the bad and the ugly. Black Hat---2015: https:\/\/www.blackhat.com\/docs\/us-15\/materials\/us-15-Zillner-ZigBee-Exploited-The-Good-The-Bad-And-The-Ugly.pdf ( 2015 ). Tobias Zillner and S Strobl. 2015. ZigBee exploited: The good, the bad and the ugly. Black Hat---2015: https:\/\/www.blackhat.com\/docs\/us-15\/materials\/us-15-Zillner-ZigBee-Exploited-The-Good-The-Bad-And-The-Ugly.pdf (2015)."}],"event":{"name":"WiSec '20: 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"],"location":"Linz Austria","acronym":"WiSec '20"},"container-title":["Proceedings of the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3395351.3399349","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3395351.3399349","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:38:34Z","timestamp":1750199914000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3395351.3399349"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,7,8]]},"references-count":32,"alternative-id":["10.1145\/3395351.3399349","10.1145\/3395351"],"URL":"https:\/\/doi.org\/10.1145\/3395351.3399349","relation":{},"subject":[],"published":{"date-parts":[[2020,7,8]]},"assertion":[{"value":"2020-07-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}