{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,21]],"date-time":"2026-03-21T20:33:33Z","timestamp":1774125213500,"version":"3.50.1"},"reference-count":103,"publisher":"MDPI AG","issue":"4","license":[{"start":{"date-parts":[[2020,4,6]],"date-time":"2020-04-06T00:00:00Z","timestamp":1586131200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Symmetry"],"abstract":"<jats:p>Protocol stacks specifically designed for the Internet of Things (IoT) have become commonplace. At the same time, security and privacy concerns regarding IoT technologies are also attracting significant attention given the risks that are inherently associated with the respective devices and their numerous applications, ranging from healthcare, smart homes, and cities, to intelligent transportation systems and industrial automation. Considering the still heterogeneous nature of the majority of IoT protocols, a major concern is to find common references for investigating and analyzing their security and privacy threats. To this end, and on top of the current literature, this work provides a comprehensive, vis-\u00e0-vis comparison of the security aspects of the thus far most widespread IoT Wireless Personal Area Network (WPAN) protocols, namely BLE, Z-Wave, ZigBee, Thread, and EnOcean. A succinct but exhaustive review of the relevant literature from 2013 up to now is offered as a side contribution.<\/jats:p>","DOI":"10.3390\/sym12040579","type":"journal-article","created":{"date-parts":[[2020,4,9]],"date-time":"2020-04-09T03:40:19Z","timestamp":1586403619000},"page":"579","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":38,"title":["A State-of-the-Art Review on the Security of Mainstream IoT Wireless PAN Protocol Stacks"],"prefix":"10.3390","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6348-5031","authenticated-orcid":false,"given":"Georgios","family":"Kambourakis","sequence":"first","affiliation":[{"name":"European Commission, Joint Research Centre (JRC), 21027 Ispra, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3020-291X","authenticated-orcid":false,"given":"Constantinos","family":"Kolias","sequence":"additional","affiliation":[{"name":"Faculty of Computer Science, College of Engineering, University of Idaho, Idaho Falls, ID 83402, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6455-502X","authenticated-orcid":false,"given":"Dimitrios","family":"Geneiatakis","sequence":"additional","affiliation":[{"name":"European Commission, Joint Research Centre (JRC), 21027 Ispra, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0142-7503","authenticated-orcid":false,"given":"Georgios","family":"Karopoulos","sequence":"additional","affiliation":[{"name":"European Commission, Joint Research Centre (JRC), 21027 Ispra, Italy"}]},{"given":"Georgios Michail","family":"Makrakis","sequence":"additional","affiliation":[{"name":"Faculty of Computer Science, College of Engineering, University of Idaho, Idaho Falls, ID 83402, USA"}]},{"given":"Ioannis","family":"Kounelis","sequence":"additional","affiliation":[{"name":"European Commission, Joint Research Centre (JRC), 21027 Ispra, Italy"}]}],"member":"1968","published-online":{"date-parts":[[2020,4,6]]},"reference":[{"key":"ref_1","unstructured":"(2020, February 27). Internet of Things (IoT) Connected Devices Installed Base Worldwide from 2015 to 2025. Available online: https:\/\/www.statista.com\/statistics\/471264\/iot-number-of-connected-devices-worldwide\/."},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Rizvi, S., Orr, R., Cox, A., Ashokkumar, P., and Rizvi, M.R. (2020). Identifying the Attack Surface for IoT Network. Internet Things, 100162.","DOI":"10.1016\/j.iot.2020.100162"},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"HaddadPajouh, H., Dehghantanha, A., Parizi, R.M., Aledhari, M., and Karimipour, H. (2019). A survey on internet of things security: Requirements, challenges, and solutions. Internet Things, 100129.","DOI":"10.1016\/j.iot.2019.100129"},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"80","DOI":"10.1109\/MC.2017.201","article-title":"DDoS in the IoT: Mirai and Other Botnets","volume":"50","author":"Kolias","year":"2017","journal-title":"Computer"},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Geneiatakis, D., Kounelis, I., Neisse, R., Nai-Fovino, I., Steri, G., and Baldini, G. (2017, January 22\u201326). Security and privacy issues for an IoT based smart home. Proceedings of the 2017 40th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO), Opatija, Croatia.","DOI":"10.23919\/MIPRO.2017.7973622"},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"82721","DOI":"10.1109\/ACCESS.2019.2924045","article-title":"A Survey on IoT Security: Application Areas, Security Threats, and Solution Architectures","volume":"7","author":"Hassija","year":"2019","journal-title":"IEEE Access"},{"key":"ref_7","unstructured":"(2020, February 03). Bluetooth Core Specification v4.0. Available online: https:\/\/www.bluetooth.org\/docman\/handlers\/downloaddoc.ashx?doc_id=456433."},{"key":"ref_8","unstructured":"(2020, February 03). Bluetooth Core Specification v5.2. Available online: https:\/\/www.bluetooth.org\/DocMan\/handlers\/DownloadDoc.ashx?doc_id=286439."},{"key":"ref_9","unstructured":"(2020, February 07). Specification of the Bluetooth System v4.2. Available online: https:\/\/www.bluetooth.org\/docman\/handlers\/downloaddoc.ashx?doc_id=441541."},{"key":"ref_10","unstructured":"ZigBee Alliance (2019, December 12). ZigBee. Available online: https:\/\/zigbeealliance.org\/solution\/zigbee\/."},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"IEEE (2016). IEEE Standard for Low-Rate Wireless Networks, IEEE. IEEE Std 802.15.4-2015 (Revision of IEEE Std 802.15.4-2011).","DOI":"10.1109\/TITB.2011.2166649"},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Morgner, P., Mattejat, S., Benenson, Z., M\u00fcller, C., and Armknecht, F. (2017, January 18\u201320). Insecure to the touch: Attacking ZigBee 3.0 via touchlink commissioning. Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Boston, MA, USA.","DOI":"10.1145\/3098243.3098254"},{"key":"ref_13","unstructured":"Silicon Labs (2019, December 12). Z-Wave Specification Documents Search Page. Available online: https:\/\/www.silabs.com\/search?q=specifications;page=1;x6=searchHeader;q6=Documents."},{"key":"ref_14","unstructured":"ITU-T (2019, December 17). G.9959: Short Range Narrow-Band Digital Radiocommunication Transceivers\u2014PHY, MAC, SAR and LLC Layer Specifications. Available online: https:\/\/www.itu.int\/rec\/T-REC-G.9959\/en."},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Genkin, D., Valenta, L., and Yarom, Y. (November, January 30). May the Fourth Be with You: A Microarchitectural Side Channel Attack on Several Real-World Applications of Curve25519. Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, Dallas, TX, USA.","DOI":"10.1145\/3133956.3134029"},{"key":"ref_16","unstructured":"Thread Group (2019, December 12). Thread Group Support. Available online: https:\/\/www.threadgroup.org\/support#specifications."},{"key":"ref_17","unstructured":"Kushalnagar, N., Montenegro, G., Culler, D.E., and Hui, J.W. (2020, March 03). RFC 4944, Transmission of IPv6 Packets over IEEE 802.15.4 Networks. Available online: https:\/\/tools.ietf.org\/html\/rfc4944."},{"key":"ref_18","unstructured":"Thubert, P., and Hui, J.W. (2020, March 03). RFC 6282, Compression Format for IPv6 Datagrams over IEEE 802.15.4-Based Networks. Available online: https:\/\/tools.ietf.org\/html\/rfc6282."},{"key":"ref_19","unstructured":"Hinden, R.M., and Deering, S.E. (2020, March 03). RFC 4291, IP Version 6 Addressing Architecture. Available online: https:\/\/tools.ietf.org\/html\/rfc4291."},{"key":"ref_20","unstructured":"Kelsey, R. (2020, March 01). Mesh Link Establishment, Internet Draft. Available online: https:\/\/tools.ietf.org\/html\/draft-ietf-6lo-mesh-link-establishment-00."},{"key":"ref_21","unstructured":"Hui, J., and Kelsey, R. (2020, February 10). RFC 7731, Multicast Protocol for Low-Power and Lossy Networks (MPL). Available online: https:\/\/tools.ietf.org\/html\/rfc7731."},{"key":"ref_22","unstructured":"Shelby, Z., Hartke, K., and Bormann, C. (2020, February 10). RFC 7252, The Constrained Application Protocol (CoAP). Available online: https:\/\/tools.ietf.org\/html\/rfc7252."},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Sastry, N., and Wagner, D. (2004, January 1). Security Considerations for IEEE 802.15.4 Networks. Proceedings of the 3rd ACM Workshop on Wireless Security, Philadelphia, PA, USA.","DOI":"10.1145\/1023646.1023654"},{"key":"ref_24","unstructured":"Hao, F. (2020, February 10). RFC 8236, J-PAKE: Password-Authenticated Key Exchange by Juggling. Available online: https:\/\/tools.ietf.org\/html\/rfc8236."},{"key":"ref_25","unstructured":"Hao, F. (2020, February 10). RFC 8235, Schnorr Non-interactive Zero-Knowledge Proof. Available online: https:\/\/tools.ietf.org\/html\/rfc8235."},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Abdalla, M., Benhamouda, F., and MacKenzie, P. (2015, January 17\u201321). Security of the J-PAKE Password-Authenticated Key Exchange Protocol. Proceedings of the 2015 IEEE Symposium on Security and Privacy, San Jose, CA, USA.","DOI":"10.1109\/SP.2015.41"},{"key":"ref_27","unstructured":"Levis, P., and Clausen, T.H. (2020, February 10). RFC 6206, The Trickle Algorithm. Available online: https:\/\/tools.ietf.org\/html\/rfc6206."},{"key":"ref_28","unstructured":"ISO\/IEC (2020, February 10). ISO\/IEC 14543-3-10:2012, Information Technology\u2014Home Electronic Systems (HES) Architecture\u2014Part 3\u201310: Wireless Short-Packet (WSP) Protocol Optimized for Energy Harvesting\u2014Architecture and Lower Layer Protocols. Available online: http:\/\/www.iso.org\/cms\/render\/live\/en\/sites\/isoorg\/contents\/data\/standard\/05\/98\/59865.html."},{"key":"ref_29","unstructured":"Oberhaching, E.G. (2019, December 12). EnOcean Technical Specifications. Available online: https:\/\/www.enocean-alliance.org\/what-is-enocean\/specifications\/."},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Zhang, Z.K., Cho, M.C.Y., Wang, C.W., Hsu, C.W., Chen, C.K., and Shieh, S. (2014, January 19). IoT Security: Ongoing Challenges and Research Opportunities. Proceedings of the 2014 IEEE 7th International Conference on Service-Oriented Computing and Applications, Matsue, Japan. ISSN: 2163-2871.","DOI":"10.1109\/SOCA.2014.58"},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Mahmoud, R., Yousuf, T., Aloul, F., and Zualkernan, I. (2015, January 16). Internet of things (IoT) security: Current status, challenges and prospective measures. Proceedings of the 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST), London, UK.","DOI":"10.1109\/ICITST.2015.7412116"},{"key":"ref_32","doi-asserted-by":"crossref","unstructured":"Wurm, J., Hoang, K., Arias, O., Sadeghi, A.R., and Jin, Y. (2016, January 9). Security analysis on consumer and industrial IoT devices. Proceedings of the 2016 21st Asia and South Pacific Design Automation Conference (ASP-DAC), Austin, TX, USA. ISSN: 2153-697X.","DOI":"10.1109\/ASPDAC.2016.7428064"},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"2483","DOI":"10.1109\/JIOT.2017.2767291","article-title":"Evaluating Critical Security Issues of the IoT World: Present and Future Challenges","volume":"5","author":"Frustaci","year":"2018","journal-title":"IEEE Internet Things J."},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"1250","DOI":"10.1109\/JIOT.2017.2694844","article-title":"A Survey on Security and Privacy Issues in Internet-of-Things","volume":"4","author":"Yang","year":"2017","journal-title":"IEEE Internet Things J."},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1016\/j.jnca.2017.04.002","article-title":"Internet of Things security: A survey","volume":"88","author":"Alaba","year":"2017","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"586","DOI":"10.1109\/TETC.2016.2606384","article-title":"A Comprehensive Study of Security of Internet-of-Things","volume":"5","author":"Mosenia","year":"2017","journal-title":"IEEE Trans. Emerg. Top. Comput."},{"key":"ref_37","first-page":"8","article-title":"Internet of Things: A survey on the security of IoT frameworks","volume":"38","author":"Ammar","year":"2018","journal-title":"J. Inf. Secur. Appl."},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"2702","DOI":"10.1109\/COMST.2019.2910750","article-title":"Demystifying IoT Security: An Exhaustive Survey on IoT Vulnerabilities and a First Empirical Look on Internet-Scale IoT Exploitations","volume":"21","author":"Neshenko","year":"2019","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_39","unstructured":"Ryan, M. (2013, January 13). Bluetooth: With Low Energy comes Low Security. Proceedings of the 7th Usenix Workshop on Offensive Technologies, Washington, DC, USA."},{"key":"ref_40","unstructured":"Jasek, S. Gattacking Bluetooth Smart Devices. Proceedings of the Black Hat USA Conference, Available online: http:\/\/gattack.io\/whitepaper.pdf."},{"key":"ref_41","doi-asserted-by":"crossref","unstructured":"Willingham, T., Henderson, C., Kiel, B., Haque, M.S., and Atkison, T. (2018, January 29\u201331). Testing Vulnerabilities in Bluetooth Low Energy. Proceedings of the ACMSE 2018 Conference, Richmond, KY, USA.","DOI":"10.1145\/3190645.3190693"},{"key":"ref_42","first-page":"170","article-title":"Bluetooth Secure Simple Pairing with enhanced security level","volume":"44","author":"Gajbhiye","year":"2019","journal-title":"J. Inf. Secur. Appl."},{"key":"ref_43","doi-asserted-by":"crossref","unstructured":"Sevier, S., and Tekeoglu, A. (2019, January 22\u201325). Analyzing the Security of Bluetooth Low Energy. Proceedings of the 2019 International Conference on Electronics, Information, and Communication (ICEIC), Auckland, New Zealand.","DOI":"10.23919\/ELINFOCOM.2019.8706457"},{"key":"ref_44","doi-asserted-by":"crossref","unstructured":"Pallavi, S., and Narayanan, V.A. (2019, January 15\u201316). An Overview of Practical Attacks on BLE Based IOT Devices and Their Security. Proceedings of the 5th International Conference on Advanced Computing Communication Systems (ICACCS), Coimbatore, India.","DOI":"10.1109\/ICACCS.2019.8728448"},{"key":"ref_45","unstructured":"Zhang, Y., Weng, J., Dey, R., Jin, Y., Lin, Z., and Fu, X. (2019). On the (In)security of Bluetooth Low Energy One-Way Secure Connections only Mode. arXiv."},{"key":"ref_46","doi-asserted-by":"crossref","unstructured":"Das, A.K., Pathak, P.H., Chuah, C.N., and Mohapatra, P. (2016, January 23\u201324). Uncovering Privacy Leakage in BLE Network Traffic of Wearable Fitness Trackers. Proceedings of the 17th International Workshop on Mobile Computing Systems and Applications\u2014HotMobile, St. Augustine, FL, USA.","DOI":"10.1145\/2873587.2873594"},{"key":"ref_47","unstructured":"Fawaz, K., Kim, K.H., and Shin, K.G. (2016, January 10\u201312). Protecting privacy of BLE device users. Proceedings of the 25th USENIX Security Symposium (USENIX Security 16), Austin, TX, USA."},{"key":"ref_48","doi-asserted-by":"crossref","unstructured":"Kolias, C., Copi, L., Zhang, F., and Stavrou, A. (2017, January 23). Breaking BLE beacons for fun but mostly profit. Proceedings of the 10th European Workshop on Systems Security, Belgrade, Serbia.","DOI":"10.1145\/3065913.3065923"},{"key":"ref_49","doi-asserted-by":"crossref","unstructured":"Zuo, C., Wen, H., Lin, Z., and Zhang, Y. (2019, January 11\u201315). Automatic Fingerprinting of Vulnerable BLE IoT Devices with Static UUIDs from Mobile Apps. Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security\u2014CCS \u201919, London, UK.","DOI":"10.1145\/3319535.3354240"},{"key":"ref_50","doi-asserted-by":"crossref","unstructured":"Sivakumaran, P., and Blasco Alis, J. (2018, January 19\u201321). A Low Energy Profile: Analysing Characteristic Security on BLE Peripherals. Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy\u2014CODASPY\u201918, Tempe, AZ, USA.","DOI":"10.1145\/3176258.3176945"},{"key":"ref_51","doi-asserted-by":"crossref","unstructured":"Korolova, A., and Sharma, V. (2018, January 19\u201321). Cross-App Tracking via Nearby Bluetooth Low Energy Devices. Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, Tempe, AZ, USA.","DOI":"10.1145\/3176258.3176313"},{"key":"ref_52","unstructured":"Sivakumaran, P., and Blasco, J. (2019, January 14\u201316). A Study of the Feasibility of Co-located App Attacks against BLE and a Large-Scale Analysis of the Current Application-Layer Security Landscape. Proceedings of the 28th USENIX Security Symposium, Santa Clara, CA, USA."},{"key":"ref_53","first-page":"1","article-title":"Security evaluation of the Z-Wave wireless protocol","volume":"24","author":"Fouladi","year":"2013","journal-title":"Black Hat USA"},{"key":"ref_54","unstructured":"Picod, J.M., Lebrun, A., and Demay, J.C. (2014, January 2\u20137). Bringing software defined radio to the penetration testing community. Proceedings of the Black Hat USA Conference, Las Vegas, NV, USA."},{"key":"ref_55","doi-asserted-by":"crossref","unstructured":"Agosta, G., Antonini, A., Barenghi, A., Galeri, D., and Pelosi, G. (2015, January 21\u201324). Cyber-security analysis and evaluation for smart home management solutions. Proceedings of the 2015 International Carnahan Conference on Security Technology (ICCST), Taipei, Taiwan. ISSN: 2153-0742.","DOI":"10.1109\/CCST.2015.7389663"},{"key":"ref_56","doi-asserted-by":"crossref","unstructured":"Fuller, J.D., and Ramsey, B.W. (2015, January 26\u201329). Rogue Z-Wave controllers: A persistent attack channel. Proceedings of the 2015 IEEE 40th Local Computer Networks Conference Workshops (LCN Workshops), Clearwater Beach, FL, USA.","DOI":"10.1109\/LCNW.2015.7365922"},{"key":"ref_57","doi-asserted-by":"crossref","first-page":"112","DOI":"10.1016\/j.cose.2017.04.004","article-title":"The Z-Wave routing protocol and its security implications","volume":"68","author":"Badenhop","year":"2017","journal-title":"Comput. Secur."},{"key":"ref_58","unstructured":"Munro, K., and Tierney, A. (2020, February 03). A Basic Z-Wave Hack Exposes Up to 100 Million Smart Home Devices. Available online: https:\/\/www.pentestpartners.com\/security-blog\/z-shave-exploiting-z-wave-downgrade-attacks\/."},{"key":"ref_59","doi-asserted-by":"crossref","unstructured":"Vidgren, N., Haataja, K., Pati\u00f1o-Andres, J.L., Ram\u00edrez-Sanchis, J.J., and Toivanen, P. (2013, January 7\u201310). Security Threats in ZigBee-Enabled Systems: Vulnerability Evaluation, Practical Experiments, Countermeasures, and Lessons Learned. Proceedings of the 2013 46th Hawaii International Conference on System Sciences, Maui, HI, USA.","DOI":"10.1109\/HICSS.2013.475"},{"key":"ref_60","doi-asserted-by":"crossref","first-page":"816","DOI":"10.1109\/JIOT.2016.2516102","article-title":"Ghost-in-ZigBee: Energy Depletion Attack on ZigBee-Based Wireless Networks","volume":"3","author":"Cao","year":"2016","journal-title":"IEEE Internet Things J."},{"key":"ref_61","doi-asserted-by":"crossref","unstructured":"\u010eurech, J., and Franekov\u00e1, M. (2014, January 23\u201325). Security attacks to ZigBee technology and their practical realization. Proceedings of the 2014 IEEE 12th International Symposium on Applied Machine Intelligence and Informatics (SAMI), Herl\u2019any, Slovakia.","DOI":"10.1109\/SAMI.2014.6822436"},{"key":"ref_62","doi-asserted-by":"crossref","unstructured":"Olawumi, O., Haataja, K., Asikainen, M., Vidgren, N., and Toivanen, P. (2014, January 14\u201316). Three practical attacks against ZigBee security: Attack scenario definitions, practical experiments, countermeasures, and lessons learned. Proceedings of the 2014 14th International Conference on Hybrid Intelligent Systems, Kuwait.","DOI":"10.1109\/HIS.2014.7086198"},{"key":"ref_63","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1016\/S1353-4858(18)30008-4","article-title":"Mitigating replay attacks with ZigBee solutions","volume":"2018","author":"Farha","year":"2018","journal-title":"Netw. Secur."},{"key":"ref_64","unstructured":"Zillner, T., and Strobl, S. (2020, February 03). ZigBee Exploited\u2014The Good, the Bad and the Ugly, Black Hat 2015. Available online: https:\/\/www.blackhat.com\/docs\/us-15\/materials\/us-15-Zillner-ZigBee-Exploited-The-Good-The-Bad-And-The-Ugly.pdf."},{"key":"ref_65","doi-asserted-by":"crossref","unstructured":"Ronen, E., Shamir, A., Weingarten, A.O., and O\u2019Flynn, C. (2017, January 22\u201324). IoT Goes Nuclear: Creating a ZigBee Chain Reaction. Proceedings of the 2017 IEEE Symposium on Security and Privacy (SP), San Jose, CA, USA.","DOI":"10.1109\/SP.2017.14"},{"key":"ref_66","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1155\/2017\/1723658","article-title":"Remotely Exploiting AT Command Attacks on ZigBee Networks","volume":"2017","author":"Vaccari","year":"2017","journal-title":"Secur. Commun. Netw."},{"key":"ref_67","doi-asserted-by":"crossref","unstructured":"Piracha, W.A., Chowdhury, M., Ray, B., Rajasegarar, S., and Doss, R. (2019, January 22\u201324). Insider Attacks on ZigBee Based IoT Networks by Exploiting AT Commands. Proceedings of the International Conference on Applications and Techniques in Information Security, Tamil Nadu, India.","DOI":"10.1007\/978-981-15-0871-4_6"},{"key":"ref_68","doi-asserted-by":"crossref","first-page":"4113","DOI":"10.1109\/TII.2018.2844955","article-title":"A Taxonomy for the Security Assessment of IP-Based Building Automation Systems: The Case of Thread","volume":"14","author":"Liu","year":"2018","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_69","doi-asserted-by":"crossref","unstructured":"Dinu, D., and Kizhvatov, I. (2018). EM Analysis in the IoT Context: Lessons Learned from an Attack on Thread. IACR Trans. Cryptogr. Hardw. Embed. Syst., 73\u201397.","DOI":"10.46586\/tches.v2018.i1.73-97"},{"key":"ref_70","unstructured":"(2020, March 03). Project Ubertooth\u2014An Open Source 2.4 GHz Wireless Development Platform Suitable for Bluetooth Experimentation. Available online: https:\/\/github.com\/greatscottgadgets\/ubertooth\/."},{"key":"ref_71","doi-asserted-by":"crossref","unstructured":"Santos, A.C.T., Filho, J.L.S., Silva, S., Nigam, V., and Fonseca, I.E. (2019). BLE injection-free attack: A novel attack on bluetooth low energy devices. J. Ambient. Intell. Humaniz. Comput., 1\u201311.","DOI":"10.1007\/s12652-019-01502-z"},{"key":"ref_72","unstructured":"Hall, J. (2020, February 03). Breaking Bulbs Briskly by Bogus Broadcasts. Available online: https:\/\/shmoo.gitbook.io\/2016-shmoocon-proceedings\/one_track_mind\/02_breaking_bulbs_briskly_by_bogus_broadcasts."},{"key":"ref_73","doi-asserted-by":"crossref","first-page":"44","DOI":"10.1016\/j.cose.2016.10.003","article-title":"Misuse-based detection of Z-Wave network attacks","volume":"64","author":"Fuller","year":"2017","journal-title":"Comput. Secur."},{"key":"ref_74","unstructured":"Fuller, J.D. (2016). A Misuse-Based Intrusion Detection System for ITU-T G.9959 Wireless Networks, Air Force Institute of Technology Wright-Petterson. Technical Report AFIT-ENG-MS-16-M-016."},{"key":"ref_75","doi-asserted-by":"crossref","first-page":"1024","DOI":"10.1109\/JSYST.2013.2246011","article-title":"Improvement of the Security of ZigBee by a New Chaotic Algorithm","volume":"8","author":"Bakhache","year":"2014","journal-title":"IEEE Syst. J."},{"key":"ref_76","unstructured":"M\u00fcller, C., Armknecht, F., Benenson, Z., and Morgner, P. (2016). On the Security of the ZigBee Light Link Touchlink Commissioning Procedure, Gesellschaft fur Informatik e.V., Lecture Notes in Informatics (LNI)."},{"key":"ref_77","doi-asserted-by":"crossref","unstructured":"Rana, S.M.S., Halim, M.A., and Kabir, M.H. (2018). Design and Implementation of a Security Improvement Framework of ZigBee Network for Intelligent Monitoring in IoT Platform. Appl. Sci., 8.","DOI":"10.20944\/preprints201807.0227.v1"},{"key":"ref_78","doi-asserted-by":"crossref","unstructured":"Rondeau, C.M., Betances, J.A., and Temple, M.A. (2018). Securing ZigBee Commercial Communications Using Constellation Based Distinct Native Attribute Fingerprinting. Secur. Commun. Netw., 2018.","DOI":"10.1155\/2018\/1489347"},{"key":"ref_79","unstructured":"Google LLC (2019, December 12). OpenThread. Available online: https:\/\/openthread.io\/."},{"key":"ref_80","doi-asserted-by":"crossref","unstructured":"Krentz, K.F., Rafiee, H., and Meinel, C. (2013, January 8\u201312). 6LoWPAN Security: Adding Compromise Resilience to the 802.15.4 Security Sublayer. Proceedings of the International Workshop on Adaptive Security, Zurich, Switzerland.","DOI":"10.1145\/2523501.2523502"},{"key":"ref_81","doi-asserted-by":"crossref","unstructured":"Piro, G., Boggia, G., and Grieco, L.A. (2014, January 6\u20138). A standard compliant security framework for IEEE 802.15.4 networks. Proceedings of the 2014 IEEE World Forum on Internet of Things (WF-IoT), Seoul, South Korea.","DOI":"10.1109\/WF-IoT.2014.6803111"},{"key":"ref_82","doi-asserted-by":"crossref","first-page":"1294","DOI":"10.1109\/COMST.2015.2388550","article-title":"Security for the Internet of Things: A Survey of Existing Protocols and Open Research Issues","volume":"17","author":"Granjal","year":"2015","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_83","doi-asserted-by":"crossref","unstructured":"Fernandes, E., Jung, J., and Prakash, A. (2016, January 22\u201326). Security Analysis of Emerging Smart Home Applications. Proceedings of the 2016 IEEE Symposium on Security and Privacy (SP), San Jose, CA, USA. ISSN: 2375-1207.","DOI":"10.1109\/SP.2016.44"},{"key":"ref_84","doi-asserted-by":"crossref","unstructured":"Standaert, F.X., and Oswald, E. (2016). Power Analysis Attacks Against IEEE 802.15.4 Nodes. Constructive Side-Channel Analysis and Secure Design, Springer International Publishing.","DOI":"10.1007\/978-3-319-43283-0"},{"key":"ref_85","doi-asserted-by":"crossref","first-page":"1910","DOI":"10.1109\/JIOT.2017.2749883","article-title":"A Survey of Potential Security Issues in Existing Wireless Sensor Network Protocols","volume":"4","author":"McCann","year":"2017","journal-title":"IEEE Internet Things J."},{"key":"ref_86","doi-asserted-by":"crossref","unstructured":"Marksteiner, S., Jimenez, V.J.E., Valiant, H., and Zeiner, H. (2017, January 23\u201324). An overview of wireless IoT protocol security in the smart home domain. Proceedings of the 2017 Internet of Things Business Models, Users, and Networks, Copenhagen, Denmark.","DOI":"10.1109\/CTTE.2017.8260940"},{"key":"ref_87","doi-asserted-by":"crossref","unstructured":"Krejci, R., Hujnak, O., and Svepes, M. (2017, January 21\u201322). Security survey of the IoT wireless protocols. Proceedings of the 2017 25th Telecommunication Forum (TEFOR), Belgrade, Serbia.","DOI":"10.1109\/TELFOR.2017.8249286"},{"key":"ref_88","doi-asserted-by":"crossref","unstructured":"Dragomir, D., Gheorghe, L., Costea, S., and Radovici, A. (2016, January 26\u201330). A Survey on Secure Communication Protocols for IoT Systems. Proceedings of the 2016 International Workshop on Secure Internet of Things (SIoT), Heraklion, Greece.","DOI":"10.1109\/SIoT.2016.012"},{"key":"ref_89","first-page":"75:1","article-title":"Secure Smart Homes: Opportunities and Challenges","volume":"50","author":"Batalla","year":"2017","journal-title":"ACM Comput. Surv."},{"key":"ref_90","doi-asserted-by":"crossref","unstructured":"Celebucki, D., Lin, M.A., and Graham, S. (2018, January 12\u201314). A security evaluation of popular Internet of Things protocols for manufacturers. Proceedings of the 2018 IEEE International Conference on Consumer Electronics (ICCE), Las Vegas, NV, USA. ISSN: 2158-4001.","DOI":"10.1109\/ICCE.2018.8326099"},{"key":"ref_91","doi-asserted-by":"crossref","unstructured":"Unwala, I., Taqvi, Z., and Lu, J. (2018, January 4\u20136). IoT Security: ZWave and Thread. Proceedings of the 2018 IEEE Green Technologies Conference (GreenTech), Austin, TX, USA. ISSN: 2166-5478.","DOI":"10.1109\/GreenTech.2018.00040"},{"key":"ref_92","doi-asserted-by":"crossref","first-page":"398","DOI":"10.1016\/j.cose.2018.07.011","article-title":"A taxonomy of cyber-physical threats and impact in the smart home","volume":"78","author":"Heartfield","year":"2018","journal-title":"Comput. Secur."},{"key":"ref_93","doi-asserted-by":"crossref","unstructured":"Pongle, P., and Chavan, G. (2015, January 8\u201310). A survey: Attacks on RPL and 6LoWPAN in IoT. Proceedings of the 2015 International Conference on Pervasive Computing (ICPC), Pune, India.","DOI":"10.1109\/PERVASIVE.2015.7087034"},{"key":"ref_94","doi-asserted-by":"crossref","first-page":"384","DOI":"10.1109\/JIOT.2014.2359538","article-title":"Security protocols and privacy issues into 6LoWPAN stack: A synthesis","volume":"1","author":"Hennebert","year":"2014","journal-title":"IEEE Internet Things J."},{"key":"ref_95","doi-asserted-by":"crossref","first-page":"796","DOI":"10.1007\/s11036-018-1089-9","article-title":"Interoperability in internet of things: Taxonomies and open challenges","volume":"24","author":"Noura","year":"2019","journal-title":"Mob. Netw. Appl."},{"key":"ref_96","first-page":"99","article-title":"Internet of things reference architectures, security and interoperability: A survey","volume":"1","author":"Rak","year":"2018","journal-title":"Internet Things"},{"key":"ref_97","doi-asserted-by":"crossref","unstructured":"Elkhodr, M., Shahrestani, S., and Cheung, H. (2016). The internet of things: New interoperability, management and security challenges. arXiv.","DOI":"10.5121\/ijnsa.2016.8206"},{"key":"ref_98","doi-asserted-by":"crossref","unstructured":"Kambourakis, G., Kolias, C., and Stavrou, A. (2017, January 23\u201325). The Mirai botnet and the IoT Zombie Armies. Proceedings of the MILCOM 2017\u20142017 IEEE Military Communications Conference (MILCOM), Baltimore, MD, USA. ISSN: 2155-7586.","DOI":"10.1109\/MILCOM.2017.8170867"},{"key":"ref_99","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1016\/j.diin.2019.03.002","article-title":"A survey of electromagnetic side-channel attacks and discussion on their case-progressing potential for digital forensics","volume":"29","author":"Sayakkara","year":"2019","journal-title":"Digit. Investig."},{"key":"ref_100","first-page":"1063005","article-title":"Detailed tracking of program control flow using analog side-channel signals: A promise for IoT malware detection and a threat for many cryptographic implementations","volume":"Volume 10630","author":"Khan","year":"2018","journal-title":"Cyber Sensing"},{"key":"ref_101","doi-asserted-by":"crossref","unstructured":"Khan, H.A., Sehatbakhsh, N., Nguyen, L.N., Callan, R.L., Yeredor, A., Prvulovic, M., and Zajic, A. (2019). IDEA: Intrusion Detection through Electromagnetic-Signal Analysis for Critical Embedded and Cyber-Physical Systems. IEEE Trans. Depend. Secur. Comput.","DOI":"10.1109\/TDSC.2019.2932736"},{"key":"ref_102","doi-asserted-by":"crossref","unstructured":"Han, Y., Etigowni, S., Liu, H., Zonouz, S., and Petropulu, A. (November, January 30). Watch Me, but Don\u2019T Touch Me! Contactless Control Flow Monitoring via Electromagnetic Emanations. Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, Dallas, TX, USA.","DOI":"10.1145\/3133956.3134081"},{"key":"ref_103","unstructured":"ON World Inc. (2020, January 20). 802.15.4 IoT Markets\u2014ZigBee, Thread, 6LoWPAN, Wi-SUN and Others\u2014A Market Dynamics Report (15th Edition). Available online: https:\/\/onworld.com\/zigbee\/index.htm."}],"container-title":["Symmetry"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2073-8994\/12\/4\/579\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T09:15:50Z","timestamp":1760174150000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2073-8994\/12\/4\/579"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,4,6]]},"references-count":103,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2020,4]]}},"alternative-id":["sym12040579"],"URL":"https:\/\/doi.org\/10.3390\/sym12040579","relation":{},"ISSN":["2073-8994"],"issn-type":[{"value":"2073-8994","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,4,6]]}}}