{"id":"https://openalex.org/W2951084996","doi":"https://doi.org/10.1109/msp.2018.1331033","title":"IoT Goes Nuclear: Creating a Zigbee Chain Reaction","display_name":"IoT Goes Nuclear: Creating a Zigbee Chain Reaction","publication_year":2018,"publication_date":"2018-01-01","ids":{"openalex":"https://openalex.org/W2951084996","doi":"https://doi.org/10.1109/msp.2018.1331033","mag":"2951084996"},"language":"en","primary_location":{"id":"doi:10.1109/msp.2018.1331033","is_oa":false,"landing_page_url":"https://doi.org/10.1109/msp.2018.1331033","pdf_url":null,"source":{"id":"https://openalex.org/S61906035","display_name":"IEEE Security & Privacy","issn_l":"1540-7993","issn":["1540-7993","1558-4046"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Security &amp; Privacy","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5000713291","display_name":"Eyal Ronen","orcid":"https://orcid.org/0000-0002-6013-7426"},"institutions":[{"id":"https://openalex.org/I53964585","display_name":"Weizmann Institute of Science","ror":"https://ror.org/0316ej306","country_code":"IL","type":"education","lineage":["https://openalex.org/I53964585"]}],"countries":["IL"],"is_corresponding":true,"raw_author_name":"Eyal Ronen","raw_affiliation_strings":["Weizmann Institute of Science"],"affiliations":[{"raw_affiliation_string":"Weizmann Institute of Science","institution_ids":["https://openalex.org/I53964585"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5009126679","display_name":"Adi Shamir","orcid":"https://orcid.org/0000-0002-5422-905X"},"institutions":[{"id":"https://openalex.org/I53964585","display_name":"Weizmann Institute of Science","ror":"https://ror.org/0316ej306","country_code":"IL","type":"education","lineage":["https://openalex.org/I53964585"]}],"countries":["IL"],"is_corresponding":false,"raw_author_name":"Adi Shamir","raw_affiliation_strings":["Weizmann Institute of Science"],"affiliations":[{"raw_affiliation_string":"Weizmann Institute of Science","institution_ids":["https://openalex.org/I53964585"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5111096600","display_name":"Achi-Or Weingarten","orcid":null},"institutions":[{"id":"https://openalex.org/I53964585","display_name":"Weizmann Institute of Science","ror":"https://ror.org/0316ej306","country_code":"IL","type":"education","lineage":["https://openalex.org/I53964585"]}],"countries":["IL"],"is_corresponding":false,"raw_author_name":"Achi-Or Weingarten","raw_affiliation_strings":["Weizmann Institute of Science"],"affiliations":[{"raw_affiliation_string":"Weizmann Institute of Science","institution_ids":["https://openalex.org/I53964585"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5079779835","display_name":"Colin O\u2019Flynn","orcid":null},"institutions":[{"id":"https://openalex.org/I129902397","display_name":"Dalhousie University","ror":"https://ror.org/01e6qks80","country_code":"CA","type":"education","lineage":["https://openalex.org/I129902397"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Colin O'Flynn","raw_affiliation_strings":["Dalhousie University, Halifax, NS, Canada"],"affiliations":[{"raw_affiliation_string":"Dalhousie University, Halifax, NS, Canada","institution_ids":["https://openalex.org/I129902397"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5000713291"],"corresponding_institution_ids":["https://openalex.org/I53964585"],"apc_list":null,"apc_paid":null,"fwci":13.8603,"has_fulltext":false,"cited_by_count":135,"citation_normalized_percentile":{"value":0.98958351,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":91,"max":100},"biblio":{"volume":"16","issue":"1","first_page":"54","last_page":"62"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/firmware","display_name":"Firmware","score":0.9403325319290161},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.6631031036376953},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6431257724761963},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.6186659336090088},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.5242365002632141},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.5141118168830872},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5108094215393066},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.502535343170166},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.45555931329727173},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3570060133934021},{"id":"https://openalex.org/keywords/computer-hardware","display_name":"Computer hardware","score":0.29841148853302},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.2039472460746765},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.17824819684028625}],"concepts":[{"id":"https://openalex.org/C67212190","wikidata":"https://www.wikidata.org/wiki/Q104851","display_name":"Firmware","level":2,"score":0.9403325319290161},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.6631031036376953},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6431257724761963},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.6186659336090088},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.5242365002632141},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.5141118168830872},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5108094215393066},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.502535343170166},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.45555931329727173},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3570060133934021},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.29841148853302},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.2039472460746765},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.17824819684028625},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/msp.2018.1331033","is_oa":false,"landing_page_url":"https://doi.org/10.1109/msp.2018.1331033","pdf_url":null,"source":{"id":"https://openalex.org/S61906035","display_name":"IEEE Security & Privacy","issn_l":"1540-7993","issn":["1540-7993","1558-4046"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Security &amp; Privacy","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Sustainable cities and communities","score":0.7699999809265137,"id":"https://metadata.un.org/sdg/11"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":12,"referenced_works":["https://openalex.org/W29626722","https://openalex.org/W1527529076","https://openalex.org/W1562542037","https://openalex.org/W2354520588","https://openalex.org/W2516427203","https://openalex.org/W2575403755","https://openalex.org/W2686848947","https://openalex.org/W2921908432","https://openalex.org/W4385385645","https://openalex.org/W6633579635","https://openalex.org/W6682554491","https://openalex.org/W6760798029"],"related_works":["https://openalex.org/W2582981600","https://openalex.org/W4389238932","https://openalex.org/W17155033","https://openalex.org/W4387467152","https://openalex.org/W3010413952","https://openalex.org/W4253989935","https://openalex.org/W4379115910","https://openalex.org/W4287635472","https://openalex.org/W2810560948","https://openalex.org/W2070793896"],"abstract_inverted_index":{"In":[0],"this":[1],"article,":[2],"we":[3],"describe":[4],"a":[5,50,54,67,77,89,94],"new":[6],"type":[7],"of":[8,60,116],"attack":[9,42],"on":[10,135],"IoT":[11],"devices,":[12],"which":[13,93],"exploits":[14],"their":[15],"ad":[16],"hoc":[17],"networking":[18],"capabilities":[19],"via":[20],"the":[21,41,44,58,61,70,83,110,114,131],"Zigbee":[22,62],"wireless":[23],"protocol,":[24,65],"and":[25,39,66,106],"thus":[26,107],"cannot":[27],"be":[28],"monitored":[29],"or":[30,136,141],"stopped":[31],"by":[32,52],"standard":[33],"Internet-based":[34],"protective":[35],"mechanisms.":[36],"We":[37],"developed":[38],"verified":[40],"using":[43],"Philips":[45],"Hue":[46],"smart":[47,117,133],"lamps":[48,118],"as":[49],"platform,":[51],"exploiting":[53],"major":[55],"bug":[56],"in":[57,69,76,82,92,119],"implementation":[59],"Light":[63],"Link":[64],"weakness":[68],"firmware":[71],"update":[72],"process.":[73],"By":[74],"plugging":[75],"single":[78],"infected":[79],"lamp":[80,100],"anywhere":[81],"city,":[84],"an":[85],"attacker":[86],"can":[87,96],"create":[88],"chain":[90],"reaction":[91],"worm":[95],"jump":[97],"from":[98],"any":[99],"to":[101,128,138,142,145],"all":[102,130],"its":[103],"physical":[104],"neighbors,":[105],"stealthily":[108],"infect":[109],"whole":[111],"city":[112],"if":[113],"density":[115],"it":[120,126],"is":[121],"high":[122],"enough.":[123],"This":[124],"makes":[125],"possible":[127],"turn":[129],"city\u2019s":[132],"lights":[134],"off,":[137],"brick":[139],"them,":[140],"use":[143],"them":[144],"disrupt":[146],"nearby":[147],"Wi-Fi":[148],"transmissions.":[149]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":6},{"year":2023,"cited_by_count":13},{"year":2022,"cited_by_count":13},{"year":2021,"cited_by_count":21},{"year":2020,"cited_by_count":25},{"year":2019,"cited_by_count":21},{"year":2018,"cited_by_count":15},{"year":2017,"cited_by_count":20}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
