Research Article

Remotely Exploiting AT Command Attacks on ZigBee Networks

Figure 3

Network traffic captured during attack execution.
(a) Traffic generated by targeted sensor
(b) Traffic generated by not targeted sensor