ZigBee alone is not enough to strengthen smart home security

In the competition with wireless technology protocols such as WiFi, Bluetooth, Z-Wave, ZigBee does not fall into the wind. One of the important reasons is that ZigBee has sufficient security, and its smart home devices are relatively reliable and not easy to crack. .

-- "ZigBee provides a three-level security model, including no security settings, access control lists (ACLs) to prevent illegal access to data, and symmetric passwords using the Advanced Encryption Standard (AES 128) for flexible security. Attributes that guarantee the security of your home ZigBee network."

So does it mean that everything is fine with the ZigBee protocol?

of course not. As recently stated in the Cognosec paper at the Black Hat Conference, although the design problem of the ZigBee protocol standard itself is not the cause of the vulnerability, if the manufacturer is not easy to use, it can be used with other networked devices. Sewing the collaborative equipment while minimizing the cost of the equipment, regardless of the necessary security at the security level, then there may be security holes in the smart home based on the agreement, which will affect the user's home experience and information security.

To put it bluntly, the ZigBee protocol itself is safe, but if the level of technology is limited or "improper operation," security is just a matter of paper. In other words, the security of smart home devices based on any protocol is not entirely determined by the protocol itself. The subjectivity of the vendor in the actual application process is also an important factor, as is the ZigBee protocol.

Some people don't quite understand why the compatibility and connectivity issues are raised in the news about the Black Hat Conference's exposure to the ZigBee protocol. In fact, this is not difficult to understand.

For example, three vendors have adopted ZigBee technology. As mentioned above, the security of their devices is also inconsistent and usually does not really achieve compatibility. However, pursuing a balance point for device compatibility to maintain mutual connectivity will, to a certain extent, expose the security risks of devices with lower security levels, resulting in a decline in overall security.

As an early enterprise that selected the ZigBee protocol as a smart home communication technology, how does the IoT do it?

In fact, IoT has always trusted ZigBee, firmly believe that ZigBee technology is the most stable, safest and fastest technology currently used in smart homes, and its encryption algorithm is not lost to banks. But even as the only board member of the ZigBee Alliance Board of Directors in Asia, IoT has never been superstitious about ZigBee, so in the application of smart home systems, the strategy adopted by IoT is: "select + strengthen", choose better technology - ZigBee And maximize security.

It is clear to ZigBee friends who know each other. It is not easy to crack the ZigBee network itself, even the professional team is very difficult.

—— In ZigBee's general security level, there are generally two keys: one is the key of the trust center; the other is the network key when actually transmitting data on the network. To break the zigbee network, you must obtain the latter 16-byte strong password network key. However, ZigBee adopts the AES 128 encryption algorithm. Without knowing the network key, the chance of brute force is very low.

-- The way the Zigbee Alliance is advancing connectivity requires that each vendor use a key of the same trust center so that the trust center can transfer network keys to different devices through this key. However, this transmission window is very short and only allows access to other devices if the ZigBee network is in a permit join. In addition, this operation must be interventional in all manufacturers. So I want to crack the network in this way, I need to wait around the network, waiting for the owner's promise to add the network.

These two points should be worthy of the satisfaction of many ZigBee adopters, because they can fully explain that the ZigBee protocol is trustworthy enough. However, IoT's smart home ZigBee network does not stop there, but has its own innovation in security.

First of all, in the system design, the system of the object is a self-ecosystem, the key of the trust center is not public, and the actual communication network key is randomly generated, so each network is different, and the illegal elements want to crack the ZigBee network. It will be difficult to add. And the overall design inspiration can be said to come from the "one hundred drugs do not invade" Apple IOS system.

Secondly, in response to the needs of some special users (such as military, aerospace industry, etc.), IoT has independently invented a way to dynamically switch network keys. In this method system, the network key can be dynamically updated and adjusted as needed, so that the network key cannot be captured, thereby greatly reducing the possibility that the entire system network is cracked.

Again, for the highest-level system, IoT can provide complex technology algorithms that are generated independently by the key communication of any two devices in the same network, and further “harden” the entire ZigBee network, basically achieving no security risks.

Of course, it is said that there are some practices around the IoT to strengthen the security of the ZigBee network, but it is irresponsible to say that any protocol network does not exist. IoT believes that it can do smart home security better, but also believes that "there is no airtight wall in the world, and there is no absolute safe network", so we also agree with the ZigBee Alliance's earlier statement on security vulnerabilities:

-- "ZigBee technology is created by some of the world's most successful companies, all of which are focused on the latest security solutions. The ZigBee Alliance member's technical working group has been actively reviewing the ZigBee security framework and seeking the best practices in the industry to stay in place. Before the evolving threat."

VESA (physical installation interface for Video Electronics Standards Association flat panel display) mounting holes are reserved on the back. Through VESA, a variety of mounting methods such as wall mounts, brackets, and swing arms can be formed. The front panel meets NEMA / IP65 waterproof and dustproof standards, preventing installation in When the control cabinet is splashed with water droplets and steam entering the host, it affects the operation of the equipment; The high-strength all-steel box structure makes it suitable for the harsh working environment of industrial sites, and is most suitable for factory automation, machinery manufacturing, numerical control equipment, Textile equipment, communication network, electric power automation and other industrial occasions.

Wall Mount Vesa Monitor

wall mount monitor,Wall Mount Vesa Monitor,best wall mount monitors,wall mount computer monitors,Wall Mount Touch Screen Monitor,wall mount displays

Shenzhen Hengstar Technology Co., Ltd. , https://www.angeltondal.com

This entry was posted in on