Security and Communication Networks / 2017 / Article / Fig 3

Research Article

Remotely Exploiting AT Command Attacks on ZigBee Networks

Figure 3

Network traffic captured during attack execution.
(a) Traffic generated by targeted sensor
(b) Traffic generated by not targeted sensor

We are committed to sharing findings related to COVID-19 as quickly as possible. We will be providing unlimited waivers of publication charges for accepted research articles as well as case reports and case series related to COVID-19. Review articles are excluded from this waiver policy. Sign up here as a reviewer to help fast-track new submissions.