IoT Network Security: Analyzing Decrypted Zigbee Traffic Data

IoT Network

Introduction

The Growing Importance of IoT Network in Smart Homes and Industrial Automation

The evolution of IoT network has transformed smart homes and industrial automation by enabling seamless connectivity between devices. According to Statista, the number of smart home users is projected to reach 785.16 million by 2028, highlighting the widespread adoption of interconnected systems.

IoT networks facilitate automation by allowing devices to communicate, monitor, and execute tasks autonomously, improving energy efficiency, security, and convenience. From smart lighting and security systems to manufacturing processes and environmental monitoring, IoT networks play a pivotal role in modern applications.

However, the security and reliability of these networks remain critical concerns. As the number of connected devices increases, so do risks associated with unauthorized access, data manipulation, and network vulnerabilities. This study addresses one of the key challenges in IoT networks—encrypted Zigbee payloads—by presenting decrypted Zigbee network traffic data for advanced security and performance assessments.

Zigbee: A Key IoT Communication Protocol

Zigbee is a widely adopted low-power wireless communication protocol designed for IoT networks, particularly in smart homes, industrial automation, and medical applications. Based on the IEEE 802.15.4 standard, Zigbee enables secure and scalable mesh networking, allowing up to 65,000 devices to communicate efficiently within a network.

The advantages of Zigbee include:

  • Low Power Consumption – Designed for battery-powered IoT devices, reducing energy usage.
  • Mesh Networking Capabilities – Devices relay signals, ensuring reliable communication even in large-scale deployments.
  • Two-Way Communication – Enables smart interaction between IoT devices, ensuring efficient automation.
  • Cost-Effective Implementation – Compared to Wi-Fi or cellular connectivity, Zigbee offers low operational costs.

Despite its strengths, Zigbee encrypts network payloads, limiting visibility into device communication patterns and security vulnerabilities. Understanding how devices interact within an IoT network requires decryption of this data—a challenge this study successfully addresses.

Challenges in IoT Network Security: Encrypted Payloads and Traffic Analysis Limitations

Security remains a major concern in IoT networks, particularly when dealing with encrypted device communication. Zigbee employs encryption to protect sensor readings, device commands, and automation triggers, but this creates hurdles for:

  • Security Testing – Without decryption, it’s difficult to analyze vulnerabilities in IoT device communication.
  • Anomaly Detection – Encrypted traffic prevents researchers from identifying suspicious behavior or cyberattacks in IoT networks.
  • Performance Optimization – Understanding traffic patterns requires analyzing real network data, which encryption obscures.

For IoT networks to remain secure and efficient, researchers must decrypt and analyze network traffic to uncover weaknesses, optimize device performance, and strengthen encryption protocols.

Research Focus: Decrypting Zigbee Network Traffic for Security and Performance Assessment

This study presents ZigBeeNet, a decrypted Zigbee IoT network traffic dataset, collected from a real smart home with 15 Zigbee devices over 20 days. The researchers extracted the network key, enabling them to:

  • Analyze device communication behavior in a live IoT network.
  • Identify security vulnerabilities by examining decrypted payloads.
  • Optimize IoT network performance using real-world traffic patterns.

Table: Zigbee Network Traffic Dataset Overview

ParameterDetails
Monitoring Period23 September – 14 October 2024 (20 days)
Total IoT Devices15 Zigbee-enabled smart home devices
Total Packets Captured24,679,823 packets
Average Packets per Minute822.55 packets
Captured Data Size930 MB
Packet Transmission Rate13.7 packets per second
Data Bit Rate4134 bits per second

By decrypting Zigbee traffic, this research provides unprecedented insights into IoT network security and efficiency, paving the way for advanced security models, anomaly detection systems, and optimized network performance strategies.

Understanding IoT Networks and Zigbee Communication

Definition of IoT Networks and Their Role in Modern Digital Infrastructure

IoT networks are an interconnected system of smart devices that communicate autonomously, improving automation, monitoring, and efficiency across various industries. These networks enable real-time data exchange, allowing devices to operate seamlessly without human intervention. IoT networks play a pivotal role in smart homes, industrial automation, healthcare monitoring, and environmental sensing.

In the context of smart homes, Zigbee-based IoT networks power essential devices like motion sensors, smart locks, lighting systems, and environmental monitors, ensuring low-latency, energy-efficient communication. Unlike traditional networking solutions, IoT networks rely on lightweight, scalable protocols optimized for battery-powered and embedded devices.

Table: IoT Network Applications and Use Cases

IndustryApplicationIoT Protocols Used
Smart HomesSmart lighting, security systemsZigbee, Z-Wave
Industrial IoTAutomation, predictive maintenanceZigbee, LoRaWAN
HealthcareWearable sensors, remote monitoringBluetooth, Wi-Fi
EnvironmentalSmart farming, air quality monitoringZigbee, LPWAN

Comparison of Major IoT Protocols: Zigbee, Z-Wave, Wi-Fi, Bluetooth, and Matter

Several communication protocols cater to IoT network requirements, differing in terms of range, energy consumption, scalability, and security.

Table: Comparison of IoT Communication Protocols

ProtocolRangeDevices SupportedPower ConsumptionSecurityScalability
Zigbee100m65,000LowAES EncryptionHigh
Wi-Fi100m250HighWPA/WPA2Moderate
Bluetooth10m20LowEncryptedLow
Z-Wave30m232LowS2 EncryptionModerate
Matter100mVariableLowSecure FrameworkHigh

Zigbee emerges as the preferred choice for IoT networks, particularly in smart home automation, due to its low power consumption, extensive device support, and mesh networking capabilities.

Advantages of Zigbee Within IoT Networks

Zigbee’s widespread adoption is fueled by its efficiency and adaptability across diverse IoT applications. Some of its key advantages include:

  • Scalability – Supports up to 65,000 devices, making it ideal for large-scale IoT deployments.
  • Energy Efficiency – Operates on low power, significantly extending battery life in devices like sensors and switches.
  • Mesh Networking – Ensures stable connections even in large infrastructures by allowing devices to relay signals.
  • Secure Communication – Uses AES encryption for end-to-end data protection, minimizing security risks.

The study highlights Zigbee’s ability to maintain network integrity through mesh connectivity, ensuring consistent data transmission across smart homes and industrial environments.

Role of Encryption and Network Keys in Zigbee Security

Zigbee’s security framework employs multi-layer encryption protocols, ensuring that transmitted data remains confidential and protected from unauthorized access.

Key Security Mechanisms in Zigbee IoT Networks

  1. Network Key Encryption – Encrypts all payloads with AES 128-bit encryption to prevent interception.
  2. Link Keys – Establishes secure communication between paired devices, limiting access to trusted entities.
  3. Message Integrity Codes (MICs) – Prevents data tampering by verifying each transmitted packet.
  4. Replay Protection – Prevents attackers from resending captured packets to disrupt the network.

Table: Security Features of Zigbee Encryption Mechanisms

Security FeatureFunctionalityPurpose
AES EncryptionEncrypts Zigbee network communicationsPrevents unauthorized access
Network KeysProtects all device-to-device transactionsSecures IoT network traffic
Link KeysEnsures authentication between paired nodesPrevents device hijacking
Replay ProtectionBlocks repeated malicious transmissionsMitigates cyberattacks

The decrypted Zigbee network traffic dataset presented in this study provides valuable insights into device communication patterns, security vulnerabilities, and network performance, enabling future advancements in IoT security models.

Methodology: Capturing and Analyzing Zigbee IoT Network Traffic

Data Collection Process

Capturing Zigbee IoT Network Traffic Using Wireshark and CC2531 USB Dongle

The research involved capturing real-time Zigbee IoT network traffic using a Texas Instruments CC2531 USB dongle, a commonly used Zigbee packet sniffer. The dongle was connected to a Raspberry Pi 3, which served as the data collection platform. Wireshark, a popular network analysis tool, was configured on the Raspberry Pi to capture Zigbee packets from the smart home IoT network operating on channel 11, ensuring precise traffic monitoring.

To manage the large dataset, the recording process was structured so that each hour of network traffic was saved into a separate pcap file. Remote access to the Raspberry Pi was also enabled, allowing real-time monitoring and immediate issue resolution during data collection.

Duration and Scope: 20-Day Zigbee Packet Analysis Across 15 Devices

The study captured Zigbee IoT network traffic continuously for 20 days, covering 15 Zigbee-enabled smart home devices. These devices included smart bulbs, motion sensors, dimmer switches, and power plugs, forming a dynamic home automation network.

Table: Overview of Zigbee Network Traffic Collection
ParameterDetails
Monitoring Duration23 September – 14 October 2024 (20 days)
Number of Devices15 Zigbee-based IoT devices
Total Packets Captured24,679,823 packets
Average Packets per Minute822.55 packets
Data Size930 MB
Storage Formatpcap files segmented hourly
Transmission Rate13.7 packets per second
Data Bit Rate4134 bits per second

This structured approach enabled accurate tracking of IoT traffic patterns, crucial for assessing device communication, encryption protocols, and security vulnerabilities.

Storage and Preprocessing Techniques: Pcap File Segmentation and Error Correction

During data collection, some captured files were found to be corrupted, displaying errors such as incomplete packet captures. This issue stemmed from Wireshark limitations, including resource constraints on the Raspberry Pi and interruptions during data recording.

To address these errors, a data preprocessing pipeline was implemented:

  1. Packet Repair Using Editcap – Corrupted files were processed using the editcap tool, correcting malformed packets to ensure usability.
  2. Merging Files for Comprehensive Analysis – The mergecap tool was used to consolidate pcap files, creating a single dataset for detailed exploration.
  3. Segmentation for Time-Based Analysis – To maintain manageable file sizes, data was divided into equal one-hour segments, aiding time-series traffic evaluation.

These preprocessing steps ensured data integrity, allowing structured Zigbee network traffic analysis for security evaluations and performance assessments.

Network Key Extraction for Traffic Decryption

Understanding Zigbee Encryption Mechanisms: Transport Key vs. Network Key

Zigbee employs multi-layer encryption to secure IoT communication:

  • Transport Key – Publicly known and used for decrypting headers of Zigbee packets, but not payload data.
  • Network Key – Private key distributed during device pairing, essential for decrypting full payloads in Zigbee network traffic.

While the transport key allows limited analysis, decrypting Zigbee traffic fully requires extracting the network key, which was successfully obtained in this study.

Step-by-Step Process of Extracting the Network Key

To decrypt payloads, the researchers followed a structured key extraction process:

  1. Capturing Device Pairing Data – A new Zigbee device was added to the network while the packet sniffer monitored traffic exchanges.
  2. Intercepting the Network Key Transmission – During the pairing process, the coordinator transmitted the network key to the new device.
  3. Extracting the Key Using Wireshark – The network key was identified within special Zigbee data frames, allowing full decryption of previously encrypted payloads.
  4. Applying Decryption to Captured Traffic – With the network key extracted, researchers decoded Zigbee messages, unveiling detailed device communication behavior and data interactions.

Importance of Decryption in IoT Network Security Research

Decrypting Zigbee IoT network traffic serves several critical purposes:

  • Device Behavior Analysis – Understanding how Zigbee devices transmit, receive, and process commands, helping optimize network efficiency.
  • Anomaly Detection – Identifying unusual network activity that could indicate intrusions, data leaks, or malfunctioning devices.
  • Security Vulnerability Assessment – Examining encryption weaknesses, allowing improvements in IoT security protocols.

By decrypting real-time Zigbee traffic, this study provides valuable insights into IoT network security, helping researchers strengthen encryption mechanisms and optimize smart home communication.

Working of the IoT Network Analysis Model

Traffic Analysis and Classification

Packet Density and Transmission Patterns

The dataset contains 24,679,823 captured packets, each recorded over a 20-day monitoring period. Researchers analyzed traffic distribution across seconds, minutes, and hours, identifying fluctuations in network activity.

Table: Packet Density Analysis Across Time Intervals
Time IntervalAverage Packets TransmittedPeak Transmission Rate
Per Second13.7 packets140 packets
Per Minute822.55 packets1750 packets
Per 10 Minutes~8000 packetsHighly variable

Graphical analysis shows sudden increases in packet transmission, indicating peak device activity periods. The study examines why these traffic surges occur, uncovering correlations between device triggers, environmental factors, and automation routines.

Device-Level Communication Behavior

Different IoT devices exhibit distinct communication behaviors within Zigbee networks. The study categorizes traffic by device type, tracking interactions among:

  • Hubs – Centralized routing nodes managing the network.
  • Bulbs & Lights – Frequent transmitters for lighting automation.
  • Sensors – Motion detectors sending event-triggered data.
  • Switches – User-activated controllers generating command signals.
Table: Zigbee Device Traffic Distribution
Device TypeTotal Packets SentPercentage of Network Traffic
Hub3,257,732 packets43.4%
Smart Bulbs1,747,384 packets14.9%
Sensors28,291 packets0.4%
Power Plugs243,766 packets3.3%

Bulbs and lights dominate Zigbee communication, transmitting constant updates for automation. Hubs handle high network traffic, ensuring seamless device coordination.

Unicast vs. Broadcast Packet Analysis

Zigbee networks rely on two transmission types:

  • Unicast Packets (78.1%) – Direct device communication.
  • Broadcast Packets (21.9%) – Network-wide transmissions.

The study identifies high unicast reliance, signaling efficient device-to-device interactions. Mesh networks, however, require broadcast packets for routing and synchronization, influencing retransmission behavior.

Table: Broadcast Traffic Distribution Across Zigbee Layers
LayerBroadcast PacketsUnicast Packets
IEEE 802.15.4151,110 packetsMajority Unicast
Zigbee NWK5,096,603 packetsHigh Broadcast
Zigbee HA135,045 packetsModerate Unicast

Zigbee networks depend on broadcast messaging for device synchronization, especially within routing protocols.

Mesh Networking Insights: Retransmission Behavior and Routing Structure

Retransmission ensures packet delivery in IoT networks. Analysis reveals that:

  • 52.3% of traffic originates from devices.
  • 47.7% consists of retransmitted packets.
  • Only 22.2% of packets reach destinations without retransmission.
Table: Packet Transmission Efficiency Across Zigbee Layers
LayerSource PacketsRelay PacketsDirect Packets
NWK64.8%35.2%0.1%
ZDP23.4%76.6%0.1%
HA67.2%32.8%41.4%

Retransmissions support network resilience, preventing communication failures due to signal loss.

Security Implications of IoT Network Traffic

Anomaly Detection in IoT Networks

Decrypting Zigbee traffic allows detailed security assessments. Researchers identify unexpected packet transmission patterns, indicating anomalous activity. Unusual spikes in broadcast traffic raise concerns about unauthorized device interactions.

Role of Decrypted Data in Security Vulnerability Assessments

Decryption exposes critical security gaps within IoT networks. Attackers can analyze traffic flow, identifying patterns in automation routines. Without proper encryption updates, malicious entities can manipulate device behavior, leading to unauthorized access and automation control bypasses.

Results and Performance Evaluation

Key Findings on IoT Network Security and Performance

Performance Comparison: Carbon-Intensive vs. Green IoT Networks

Traditional IoT networks consume excessive energy due to constant device interactions. Zigbee-based mesh networks demonstrate energy-efficient behavior, reducing unnecessary retransmissions.

Table: Energy Efficiency Metrics of IoT Network Models
Network ModelEnergy ConsumptionPacket Transmission Efficiency
Standard IoTHigh Power UsageFrequent Retransmissions
Zigbee IoTLow Power UsageOptimized Routing

Efficiency Improvements Using Decrypted Zigbee Traffic for Network Optimization

Decryption allows traffic modeling, enabling:

  • Adaptive packet scheduling to reduce network congestion.
  • Optimized device response timing for energy conservation.
  • Real-time security monitoring, detecting anomalies faster.

Identification of IoT Security Gaps

Researchers uncovered encryption weaknesses affecting Zigbee networks. Attackers could intercept pairing processes, extracting the network key. Without frequent key rotation, devices remain susceptible to unauthorized access

Reference and License

Reference: Keleşoğlu, N.; Sobczak, Ł. (2024). ZigBeeNet: Decrypted Zigbee IoT Network Traffic Dataset in Smart Home Environment. Applied Sciences, 14, 10844. https://doi.org/10.3390/app142310844

License: This blog follows the Creative Commons Attribution 4.0 International (CC BY 4.0) License, which allows free use, distribution, and adaptation of the material, provided proper credit is given to the original authors.