We present a decrypted ZigBee IoT network traffic dataset in a smart home environment.
We use 15 devices in total, six different types of devices (Hub, Power Plug, Smart Light, Smart Bulb, Wall Switch and Motion Sensor) and nine different devices.
We have collected data from 20 days.
We were using a Zigbee Sniffer based on the Texas Instruments CC2531 chip and a Wireshark plugin to capture data to pcap files.
Hub
- Hue Bridge
Power Plug
- Hue Smart Plug
Smart Light
- Hue White and Color Ambiance Play #1
- Hue White and Color Ambiance Play #2
- Hue Go
Smart Bulb
- Hue White and Color Ambiance Bulb #1
- Hue White and Color Ambiance Bulb #2
- Hue White Ambiance Bulbs #1
- Hue White Ambiance Bulbs #2
- Hue White Ambiance Bulbs #3
- Lidl Livarno RGB Bulb #1
- Lidl Livarno RGB Bulb #2
Wall Switch
- Hue Dimmer Switch #1
- Hue Dimmer Switch #2
Motion Sensor
- Hue Motion Sensor
You can download the dataset from Zenodo library here.
To analyze the dataset, you'll need to have Wireshark installed. You can download it from the Wireshark official website and follow the installation instructions for your operating system.
Download the dataset from the Zenodo library. You can find it at the provided link above.
Once you've downloaded the dataset (a .tar.gz
file), you need to extract it. You can use the following command in your terminal:
tar -xzvf dataset.tar.gz
Alternatively, you can use software like 7-Zip to extract the contents if you're on Windows.
The dataset contains multiple PCAP files that need to be merged if you want to analyze all packets, use the script located at scripts/merger.sh
. Run it as follows:
bash scripts/merger.sh
This script will help you combine multiple .pcap
files into one for easier analysis.
Once the dataset is extracted, open the .pcap
file in Wireshark by either double-clicking the file or selecting File -> Open
in Wireshark.
To properly analyze the Zigbee packets, you need to configure Wireshark to interpret the data correctly:
- Go to
Edit -> Preferences -> Protocols -> IEEE 802.15.4
. - Change the "FCS format" to TI CC24xx metadata.
- Check the option Enable ACK tracking.
To decrypt Zigbee traffic and view the payload of individual packets:
- Go to
Edit -> Preferences -> Protocols -> Zigbee -> Pre-configured keys
. - Add the following network key:
13:CE:8C:B5:C1:FC:6F:20:8D:63:83:3D:59:D4:FA:2A
.
Now, all the packet data should be visible in Wireshark, including the decrypted payload of Zigbee packets. You can inspect individual packets, see their payloads, and analyze the communication within the Zigbee network.