Research Article

Remotely Exploiting AT Command Attacks on ZigBee Networks

Figure 4

Traffic generated by attacker sensor.