The following video shows the process of the Capacity Exploitation. It also shows the damaging impact of such a vulnerability: Legitimate devices cannot be accepted to the Zigbee network anymore.
The following video shows the process of the Offline Attack. It also shows the damaging impact of such a vulnerability: Connected Zigbee devices can be triggered to go offline and lose their functionalities.
The following video shows the process of the Network Key Leakage Attack. It also shows the damaging impact of such a vulnerability: The whole Zigbee network is compromised.
Specifically, in this video, we show that attackers can get complete control of a legitimate smart plug in the compromised network.
For the Hijacking Attack, we provide the captured traffic log file which shows the process of hijacking a Philips Hue dimmer switch.
https://drive.google.com/drive/folders/16IhESDk6aGJJDAJQVFfKnJmZ2Vh6RGtU?usp=sharing
The following link contains the traffic log files for all vulnerabilities mentioned above.
https://drive.google.com/drive/folders/1-oDXiv0mSIJPoSitOEN33ovcXwrTeK3S?usp=sharing