TY - GEN
T1 - Evaluating ITU-T G.9959 based wireless systems used in critical infrastructure assets
AU - Badenhop, Christopher
AU - Fuller, Jonathan
AU - Hall, Joseph
AU - Ramsey, Benjamin
AU - Rice, Mason
N1 - Publisher Copyright:
© IFIP International Federation for Information Processing 2015.
PY - 2015
Y1 - 2015
N2 - ITU-T G.9959 wireless connectivity is increasingly incorporated in the critical infrastructure. However, evaluating the robustness and security of commercially-available products based on this standard is challenging due to the closed-source nature of the transceiver and application designs. Given that ITU-T G.9959 transceivers are being used in smart grids, building security systems and safety sensors, the development of reliable, open-source tools would enhance the ability to monitor and secure ITU-T G.9959 networks. This chapter discusses the ITU-T G.9959 wireless standard and research on ITU-T G.9959 network security. An open-source, software-defined radio implementation of an ITU-T G.9959 protocol sniffer is used to explore several passive reconnaissance techniques and deduce the properties of active network devices. The experimental results show that some properties are observable regardless of whether or not encryption is used. In particular, the acknowledgment response times vary due to differences in vendor firmware implementations.
AB - ITU-T G.9959 wireless connectivity is increasingly incorporated in the critical infrastructure. However, evaluating the robustness and security of commercially-available products based on this standard is challenging due to the closed-source nature of the transceiver and application designs. Given that ITU-T G.9959 transceivers are being used in smart grids, building security systems and safety sensors, the development of reliable, open-source tools would enhance the ability to monitor and secure ITU-T G.9959 networks. This chapter discusses the ITU-T G.9959 wireless standard and research on ITU-T G.9959 network security. An open-source, software-defined radio implementation of an ITU-T G.9959 protocol sniffer is used to explore several passive reconnaissance techniques and deduce the properties of active network devices. The experimental results show that some properties are observable regardless of whether or not encryption is used. In particular, the acknowledgment response times vary due to differences in vendor firmware implementations.
KW - ITU-T G.9959
KW - Vulnerabilities
KW - Wireless sniffing
KW - Z-Wave
UR - https://www.scopus.com/pages/publications/84951872109
U2 - 10.1007/978-3-319-26567-4_13
DO - 10.1007/978-3-319-26567-4_13
M3 - Conference contribution
AN - SCOPUS:84951872109
SN - 9783319265667
T3 - IFIP Advances in Information and Communication Technology
SP - 209
EP - 227
BT - Critical Infrastructure Protection IX - 9th IFIP 11.10 International Conference, ICCIP 2015, Revised Selected Papers
A2 - Rice, Mason
A2 - Shenoi, Sujeet
PB - Springer New York LLC
T2 - 9th IFIP 11.10 International Conference on Critical Infrastructure Protection, ICCIP 2015
Y2 - 16 March 2015 through 18 March 2015
ER -