IoT Goes Nuclear: Creating a Zigbee Chain Reaction

Eyal Ronen, Adi Shamir, Achi Or Weingarten, Colin Oflynn

Research output: Contribution to journalArticlepeer-review

Abstract

In this article, we describe a new type of attack on IoT devices, which exploits their ad hoc networking capabilities via the Zigbee wireless protocol, and thus cannot be monitored or stopped by standard Internet-based protective mechanisms. We developed and verified the attack using the Philips Hue smart lamps as a platform, by exploiting a major bug in the implementation of the Zigbee Light Link protocol, and a weakness in the firmware update process. By plugging in a single infected lamp anywhere in the city, an attacker can create a chain reaction in which a worm can jump from any lamp to all its physical neighbors, and thus stealthily infect the whole city if the density of smart lamps in it is high enough. This makes it possible to turn all the city's smart lights on or off, to brick them, or to use them to disrupt nearby Wi-Fi transmissions.

Original languageEnglish
Article number8283484
Pages (from-to)54-62
Number of pages9
JournalIEEE Security and Privacy
Volume16
Issue number1
DOIs
StatePublished - 1 Jan 2018
Externally publishedYes

Keywords

  • IEEE Symposium on Security and Privacy
  • Internet of Things
  • IoT
  • Zigbee
  • security
  • smart lamp

All Science Journal Classification (ASJC) codes

  • Computer Networks and Communications
  • Electrical and Electronic Engineering
  • Law

Fingerprint

Dive into the research topics of 'IoT Goes Nuclear: Creating a Zigbee Chain Reaction'. Together they form a unique fingerprint.

Cite this