Professional Documents
Culture Documents
TABLE OF CONTENTS
ABSTRACT .....................................................................................................................................................1
INTRODUCTION .............................................................................................................................................1
THE ZIGBEE STANDARD ..............................................................................................................................1
ZIGBEE SECURITY ........................................................................................................................................2
Network Layer Security ................................................................................................................................2
Application Support Sublayer Security .........................................................................................................2
ZIGBEE APPLICATION PROFILES ...............................................................................................................3
ZigBee Home Automation Public Application Profile (HAPAP) ....................................................................3
ZigBee Light Link Profile (ZLL) .....................................................................................................................4
SECBEE – A NEW ZIGBEE SECURITY TESTING TOOL .............................................................................4
REAL WORLD ASSESSMENTS AND IDENTIFIED VULNERABILITIES .....................................................5
CONCLUSION .................................................................................................................................................5
BIBLIOGRAPHY .............................................................................................................................................6
Cognosec Gmbh
Classification: Confidential ii
ZigBee Exploited
Version 1.0
Cognosec Gmbh
Classification: Confidential PAGE 1 OF 6
ZigBee Exploited
Version 1.0
Cognosec Gmbh
Classification: Confidential PAGE 3 OF 6
ZigBee Exploited
Version 1.0
the case where alternative pre-configured link As every ZLL device joining to a ZLL network
keys specifically associated with a device can be shall use per definition the ZLL master key to
used as well." (ZigBee Alliance 2013, p. 44) derive the active network key, knowledge of the
Since, as discussed before, the security of ZigBee ZLL master key allows an attacker to intercept the
is highly reliant on the secrecy of the key material key- exchange and acquire the current active
and therefore on the secure initialisation and network key. This would then allow the attacker to
transport of the encryption keys, this default control all devices in the ZigBee network. As the
fallback mechanism has to be considered as ZLL master key has supposedly been leaked in
critical risk. If an attacker is able to sniff a device the Internet (e.g. on reddit and some online
join using the default TC link key, the active forums), the security of the ZLL devices has to be
network key is compromised and the considered as compromised.
confidentiality of the whole network
communication can be considered as Besides the leaked key, ZLL devices support a
compromised. This might be a lower risk if only feature called “Touchlink Commissioning” that
light bulbs are used, but as HVAC systems and allows devices to be paired with controllers. As
door-locks also use the Home-Automation profile, the default and publicly known TC link key is
the impact on security of this profile requirement used, devices can be “stolen”. Tests showed that
is greatly increased. amateur radio hardware using normal dipole
(Rasperry Pi extension board) antennas already
ZigBee Light Link Profile (ZLL) allowed Touchlink Commission from several
meters away whereas for security reasons this
The ZigBee Light Link (ZLL) profile addresses should only work in close proximity. Usage of
devices and functionality in the over-the-counter, professional radio equipment would allow an even
consumer lighting application domain. (ZigBee higher distance for such a successful device
Alliance 2012, p. 1) takeover.
Cognosec Gmbh
Classification: Confidential PAGE 4 OF 6
ZigBee Exploited
Version 1.0
Cognosec Gmbh
Classification: Confidential PAGE 5 OF 6
ZigBee Exploited
Version 1.0
Key Transport: The default TC link key ZigBee Alliance, (2008). ZIGBEE
should not be used since this key is SPECIFICATION San Ramon, United States.
considered as public knowledge and provides ZigBee Document 053474r17. ZigBee Alliance
the same level of security as unencrypted key (2012). ZigBee Light Link Standard. San Ramon,
transport. United States. Version 1.0, ZigBee Document 11-
Key Establishment: The master keys used 0037-10.
during key establishment shall be distributed
via out-of- band channels. For example a ZigBee Alliance (2012). ZigBee Light Link
sticker with a preconfigured master key could Standard. San Ramon, United States. Version
be attached to a device and entered by the 1.0, ZigBee Document 11-0037-10.
user during device setup.
ZigBee Alliance, (2013a). ZIGBEE HOME
Key Rotation: The security of the AUTOMATION PUBLIC APPLICATION
communication is dependent on the secrecy of PROFILE. San Ramon, United States. Revision
the network key and of the link keys. The 29, Version 1.2, ZigBee Document 05-3520-29.
network key shall be changed periodically.
Key management in form of changing the
network key in a meaningful time period or
after a certain number of messages should be
introduced. Otherwise known plaintext or other
attacks on the security of AES may be
possible.
BIBLIOGRAPHY
Goodspeed, T. (2009), Extracting Keys from
Second Generation Zigbee Chips. Black Hat
USA, Las Vegas.
Cognosec Gmbh
Classification: Confidential PAGE 6 OF 6