Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3548606.3560703acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article
Open access

Don't Kick Over the Beehive: Attacks and Security Analysis on Zigbee

Published: 07 November 2022 Publication History

Abstract

The blooming of the Internet of Things (IoT) has led to the demand for new connectivity technologies. Zigbee, with its low-power consumption and flexible network structure, has become one of the essential wireless communication protocols in the IoT ecosystem and is adopted by many major companies. There have been over thousands of certified Zigbee products, ranging from sensors, to link light products, to smart energy devices. A common belief is that Zigbee is comparatively secure, due to the nature of closed networks and the use of encryption.
However, in this paper, we find Zigbee-related attacks in which adversaries are outside of the target network and have no knowledge of the encryption keys. The low attack requirements pose high threats. The attacks mislead devices to accept forged packets, which will jeopardize the normal operations of Zigbee networks. We further develop a framework to efficiently identify such problems. The framework supports flexible modification of address and network information, and bit-level manipulations from the MAC layer. To accelerate analysis, we design semantic-aware fuzzing to generate packet candidates that are more likely to produce meaningful results.
We conduct experiments on 10 real-world Zigbee systems. Using our approach, we have identified five types of practical attacks, ranging from communication disruption to security key leakage. We show proof-of-concept attacks on industry Zigbee products and systems. Our findings bring to light new security issues of Zigbee and further motivate possible mitigation approaches.

References

[1]
2020. CVE-2019--15914. https://github.com/chengcheng227/CVE-POC/blob/mas ter/CVE-2019--15914_1.md. (2020).
[2]
9to5Mac. 2018. HomeKit Devices Getting More Affordable as Lenovo Announces Smart Home Essentials Line. https://9to5mac.com/2018/08/31/cheap-homekitbulbs-switches-camera/. (2018).
[3]
Humberto J. Abdelnur, Radu State, and Olivier Festor. 2007. KiF: A Stateful SIP Fuzzer. In 1st International Conference on Principles, Systems and Applications of IP Telecommunications (IPTComm).
[4]
Raafat Aburukba, A. R. Al-Ali, Nourhan Kandil, and Diala AbuDamis. 2016. Configurable ZigBee-based Control System for People with Multiple Disabilities in Smart Homes. In International Conference on Industrial Informatics and Computer Systems(CIICS).
[5]
Dimitrios-Georgios Akestoridis, Madhumitha Harishankar, Michael Weber, and Patrick Tague. 2020. Zigator: Analyzing the Security of Zigbee-Enabled Smart Homes. In 13th Conference on Security and Privacy in Wireless and Mobile Networks (WiSec).
[6]
Dimitrios-Georgios Akestoridis and Patrick Tague. 2021. HiveGuard: A Network Security Monitoring Architecture for Zigbee Networks. In 2021 IEEE Conference on Communications and Network Security (CNS).
[7]
Ahmad Alagil, Meshari Alotaibi, and Yao Liu. 2016. Randomized Positioning DSSS for Anti-Jamming Wireless Communications. In International Conference on Computing, Networking and Communications (ICNC).
[8]
Connectivity Standards Alliance. 2017. Zigbee Specification. ZigBee Document 05--3474--22.
[9]
Omar Alrawi, Chaz Lever, Manos Antonakakis, and Fabian Monrose. 2019. SoK: Security Evaluation of Home-Based IoT Deployments. In 40th IEEE Symposium on Security and Privacy (S&P).
[10]
Pedram Amini and Aaron Portnoy. 2007. Sulley: Fuzzing Framework. http: //www.fuzzing.org/wp-content/SulleyManual.pdf. (2007).
[11]
Manos Antonakakis, Tim April, Michael Bailey, Matt Berhard, Elie Bursztein, Jaime Cochran, Zakir Durumeric, J. Alex Halderman, Luca Invernizzi, Michalis Kallitsis, Deepak Kumar, Chaz Lever, Zane Ma, Joshua Mason, Daimian Menscher, Chad Seaman, Nick Sullivan, Kurt Thomas, and Yi Zhou. 2017. Understanding the Mirai Botnet. In 26th USENIX Security Symposium (USENIX Security).
[12]
Apple. 2022. HomeKit - Apple Developer. https://developer.apple.com/homekit/. (2022).
[13]
Anshuman Biswas, Abdulaziz Alkhalid, Thomas Kunz, and Chung-Horng Lung. 2012. A Lightweight Defence Against the Packet in Packet Attack in ZigBee Networks. In 2012 IFIP Wireless Days (WD).
[14]
Kevin Bock, George Hughey, Xiao Qiang, and Dave Levin. 2019. Geneva: Evolving Censorship Evasion Strategies. In 2019 ACM SIGSAC Conference on Computer and Communications Security (CCS).
[15]
Laurent Butti and Julien Tinnès. 2007. Discovering and Exploiting 802.11 Wireless Driver Vulnerabilities. In Information and Communications Technology Security Symposium (SSTIC).
[16]
Xianghui Cao, Devu Manikantan Shila, Yu Cheng, Zequ Yang, Yang Zhou, and Jiming Chen. 2016. Ghost-in-ZigBee: Energy Depletion Attack on ZigBee-Based Wireless Networks. IEEE Internet of Things Journal 3, 5 (2016), 816--829.
[17]
Romain Cayre, Florent Galtier, Guillaume Auriol, Vincent Nicomette, Mohamed Kaâniche, and Géraldine Marconato. 2021. WazaBee: Attacking Zigbee Networks by Diverting Bluetooth Low Energy Chips. In 2021 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN).
[18]
Jiming Chen, Qing Yu, Bo Chai, Youxian Sun, Yanfei Fan, and Xuemin Shen. 2015. Dynamic Channel Assignment for Wireless Sensor Networks: A Regret Matching Based Approach. In IEEE Transactions on Parallel and Distributed Systems (TPDS).
[19]
Weiteng Chen and Zhiyun Qian. 2018. Off-Path TCP Exploit: How Wireless Routers Can Jeopardize Your Secrets. In 27th USENIX Security Symposium (USENIX Security).
[20]
Tao Chi and Haowei Yan. 2017. A Dynamic Channel Assignment for Coexistence of ZigBee/WiFi. In 2017 International Conference on Information Technology and Intelligent Manufacturing (ITIM).
[21]
Connectivity Standards Alliance 2022. Connectivity Standards Alliance Products. https://csa-iot.org/csa-iot_products/. (2022).
[22]
Cristiano Andre da Costa, Cristian F. Pasluosta, Bjorn Eskofier, Denise Bandeira da Silva, and Rodrigo da Rosa Righi. 2018. Internet of Health Things: Toward intelligent vital signs monitoring in hospital wards. Artificial Intelligence In Medicine (2018), 61--69.
[23]
Joeri de Ruiter and Erik Poll. 2015. Protocol State Fuzzing of TLS Implementation. In 24th USENIX Security Symposium (USENIX Security).
[24]
George Demiris and Brian K. Hensel. 2008. Technologies for an Aging Society: A Systematic Review of 'Smart Home' Applications. IMIA Yearbook of Medical Informatics 2008 (2008), 33--40.
[25]
Ganesh Devarajan. 2007. Unraveling SCADA Protocols: Using Sulley Fuzzer. In DEF CON 15 Hacking Conference.
[26]
Gianluca Dini and Marco Tiloca. 2010. Considerations on Security in Zigbee Networks. In 2010 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC).
[27]
Karel Domin, Eduard Marin, and Iraklis Symeonidis. 2016. Security Analysis of the Drone Communication Protocol: Fuzzing the MAVLink Protocol. https: //orbilu.uni.lu/bitstream/10993/37613/1/article-2667.pdf. (2016).
[28]
ElectronicDesign. 2004. ZigBee Special Report: The ZigBee Buzz Is Growing. https://www.electronicdesign.com/energy/zigbee-special-report-zigbee-buzzgrowing. (2004).
[29]
Altaf Engineer, Esther M. Sternberg, and Bijan Najafi. 2018. Designing Interiors to Mitigate Physical and Cognitive Deficits Related to Aging and to Promote Longevity in Older Adults: A Review. Gerontology (2018), 612--622.
[30]
Earlence Fernandes, Amir Rahmati, Jaeyeon Jung, and Atul Prakash. 2018. Decentralized Action Integrity for Trigger-Action IoT Platforms. In Network and Distributed Systems Security Symposium (NDSS).
[31]
Arthur Gatouillat, Youakim Badr, Bertrand Massot, and Ervin Sejdic. 2018. Internet of Medical Things: A Review of Recent Contributions Dealing With CyberPhysical Systems in Medicine. Internet of Things Journal (2018), 3810--3822.
[32]
Travis Goodspeed. 2009. Extracting Keys from Second Generation Zigbee Chips. In Black Hat USA. https://www.blackhat.com/presentations/bh-usa-09/GOOD SPEED/BHUSA09-Goodspeed-ZigbeeChips-PAPER.pdf
[33]
Travis Goodspeed, Sergey Bratus, Ricky Melgares, Rebecca Shapiro, and Ryan Speers. 2011. Packets in Packets: Orson Welles' In-Band Signaling Attacks for Modern Radios. In Proc. 5th USENIX Workshop on Offensive Technologies (WOOT). San Francisco, CA.
[34]
Tom's Guide. 2022. Best Smart Home Hubs. https://www.tomsguide.com/us/bestsmart-home-hubs,review-3200.html. (2022).
[35]
Jan Haase, Mahmoud Alahmad, Hiroaki Nishi, Joern Ploennigs, and Kim Fung Tsang. 2016. The IOT Mediated Built Environment: A Brief Survey. In IEEE 14th International Conference on Industrial Informatics (INDIN).
[36]
Bing Huang, Alvaro A. Cardenas, and Ross Baldick. 2019. Not Everything is Dark and Gloomy: Power Grid Protections Against IoT Demand Attacks. In Proc. 28th USENIX Security Symposium (USENIX Security). Santa Clara, CA.
[37]
InformationWeek. 2020. IoT Revenue Projected to Reach $3 Trillion by 2025. https://www.informationweek.com/it-life/iot-market-could-top-3-trillion-by2025-report-finds. (2020).
[38]
Texas Instruments. 2022. CC2531 USB Evaluation Module Kit. https://www.ti.c om/tool/CC2531EMK. (2022).
[39]
Texas Instruments. 2022. CC2538 Development Kit. https://www.ti.com/tool/ CC2538DK. (2022).
[40]
Samuel Jero, Xiangyu Bu, Cristina Nita Rotaru, Hamed Okhravi, Richard Skowyra, and Sonia Fahmy. 2017. BEADS: Automated Attack Discovery in OpenFlow-Based SDN Systems. In Research in Attacks, Intrusions, and Defenses (RAID).
[41]
Won Min Kang, Seo Yeon Moon, and Jong Hyuk Park. 2017. An enhanced security framework for home appliances in smart home. Human-centric Computing and Information Sciences (2017), 7(6).
[42]
Hongil Kim, Jiho Lee, Eunkyu Lee, and Yongdae Kim. 2019. Touching the Untouchables: Dynamic Security Analysis of the LTE Control Plane. In 40th IEEE Symposium on Security and Privacy (S&P).
[43]
Takahisa Kitagawa, Miyuki Hanaoka, and Kenji Kono. 2010. AspFuzz: A Stateaware Protocol Fuzzer based on Application-layer Protocols. In The IEEE symposium on Computers and Communications (ISCC).
[44]
Irina Krivtsova, Ilya Lebedev, Mikhail Sukhoparov, Nurzhan Bazhayev, Igor Zikratov, Aleksandr Ometov, Sergey Andreev, Pavel Masek, Radek Fujidiak, and Jiri Hosek. 2016. Implementing a Broadcast Storm Attack on a Mission-Critical Wireless Sensor Network. In Wired/Wireless Internet Communications (WWIC).
[45]
Gunhee Lee, Jaesung Lim, Dong kyoo Kim, SungHyun Yang, and MyungHyun Yoon. 2008. An Approach to Mitigating Sybil Attack in Wireless Networks Using ZigBee. In 10th International Conference on Advanced Communication Technology (ICACT).
[46]
Seungsoo Lee, Changhoon Yoon, Chanhee Lee, Seungwon Shin, Vinod Yegneswaran, and Phillip Porras. 2017. DELTA: A Security Assessment Framework for Software-Defined Networks. In Network and Distributed Systems Security Symposium (NDSS).
[47]
Antti Levomäki, Olli-Pekka Niemi, and Christian Jalio. 2017. Automatic Discovery of Evasion Vulnerabilities Using Targeted Protocol Fuzzing. In Black Hat 2017. https://www.blackhat.com/docs/eu-17/materials/eu-17-LevomakiAutomatic-Discovery-Of-Evasion-Vulnerabilities-Using-Targeted-ProtocolFuzzing-wp.pdf
[48]
Hui Li, Weishi Zhang, Weifu Zhou, and Bo Su. 2014. A Novel Vulnerability Detection Method for ZigBee MAC Layer. In 2014 IEEE 12th International Conference on Dependable, Autonomic and Secure Computing (DASC).
[49]
Spencer Michaels, Kemal Akkaya, and A. Selcuk Uluagac. 2016. Inducing Data Loss in Zigbee Networks via Join/Association Handshake Spoofing. In IEEE Conference on Communications and Network Security (CNS).
[50]
Barton P. Miller, Lars Fredriksen, and Bryan So. 1990. An Empirical Study of the Reliability of UNIX Utilities. Communications of the ACM (1990), 32--44.
[51]
MIT. 2017. Security Analysis of Zigbee. https://courses.csail.mit.edu/6.857/2017/ project/17.pdf. (2017).
[52]
Philipp Morgner, Stephan Maejat, Zinaida Benenson, Christian Muller, and Frederik Armknecht. 2017. Insecure to the Touch: Attacking ZigBee 3.0 via Touchlink Commissioning. In 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec).
[53]
Mozilla. 2017. Peach Security Fuzzing. https://wiki.mozilla.org/Security/Fuzzin g/Peach. (2017).
[54]
Aristides Mpitziopoulos, Damianos Gavalas, Charalampos Konstantopoulos, and Grammati Pantziou. 2009. A Survey on Jamming Attacks and Countermeasures in WSNs. In IEEE COMMUNICATIONS SURVEYS & TUTORIALS, Vol. 11. 42--56.
[55]
Yahoo! News. 2016. Why IoT, Big Data & Smart Farming Are the Future of Agriculture. https://uk.news.yahoo.com/why-iot-big-data-smart-192155797.ht ml. (2016).
[56]
Satoshi Okada, Daisuke Miyamoto, Yuji Sekiya, and Hiroshi Nakamura. 2021. New LDoS Attack in Zigbee Network and Its Possible Countermeasures. In 2021 IEEE International Conference on Smart Computing (SMARTCOMP).
[57]
Olayemi Olawumi, Keijo Haataja, Mikko Asikainen, and Niko Vidgren Pekka Toivanen. 2014. Three Practical Attacks Against ZigBee Security: Attack Scenario Definitions, Practical Experiments, Countermeasures, and Lessons Learned. In 14th International Conference on Hybrid Intelligent System (HIS).
[58]
Taifeng Pan. 2021. ZigBee Wireless Network Attack and Detection. In Advances in Artificial Intelligence and Security, Xingming Sun, Xiaorui Zhang, Zhihua Xia, and Elisa Bertino (Eds.). Springer International Publishing, Cham, 391--403.
[59]
Van Thuan Pham, Marcel Böhme, and Abhik Roychoudhury. 2020. AFLNET: A Greybox Fuzzer for Network Protocols. In 2020 IEEE 13th International Conference on Software Testing, Validation and Verification (ICST).
[60]
Eyal Ronen, Adi Shamir, Achi-Or Weingarten, and Colin O'Flynn. 2017. IoT Goes Nuclear: Creating a ZigBee Chain Reaction. In Proc. IEEE Symposium on Security and Privacy (S&P).
[61]
Kudelski Security. 2017. ZigBee Security: Basics. https://research.kudelskisecur ity.com/2017/11/21/zigbee-security-basics-part-3/. (2017).
[62]
Narmeen Shafqat, Daniel J. Dubois, David R. Choffnes, Aaron Schulman, Dinesh Bharadia, and Aanjhan Ranganathan. 2021. ZLeaks: Passive Inference Attacks on Zigbee based Smart Homes. CoRR abs/2107.10830 (2021). arXiv:2107.10830
[63]
Haykin Simon and Michael Moher. 2009. Communication systems. Wiley.
[64]
Smartthings. 2016. Disable ZigBee Insecure Rejoin. https://community.smartthi ngs.com/t/disable-zigbee-insecure-rejoin/40809. (2016).
[65]
Saleh Soltan and Prateek Mittal. 2018. BlackIoT: IoT Botnet of High Wattage Devices Can Disrupt the Power Grid. In 27th USENIX Security Symposium (USENIX Security).
[66]
Grace Hanusha Talakala and Jyotsna Bapat. 2021. Detecting Spoofing Attacks in Zigbee using Device Fingerprinting. In 2021 IEEE 18th Annual Consumer Communications Networking Conference (CCNC).
[67]
Yuan Tian, Nan Zhang, Yueh-Hsun Lin, XiaoFeng Wang, Blase Ur, XianZheng Guo, and Patrick Tague. 2017. SmartAuth: User-Centered Authorization for the Internet of Things. In 26th USENIX Security Symposium (USENIX Security).
[68]
Petar Tsankov, Mohammad Torabi Dashti, and David Basin. 2012. SECFUZZ: Fuzz-testing Security Protocols. In 7th International Workshop on Automation of Software Test (AST).
[69]
Ubilogix. 2022. Ubiqua Protocol Analyzer. https://www.ubilogix.com/ubiqua/. (2022).
[70]
Ivan Vaccari, Enrico Cambiaso, and Maurizio Aiello. 2017. Remotely Exploiting AT Command Attacks on ZigBee Networks. Security and Communication Networks (2017), 9.
[71]
Niko Vidgren, Keijo Haataja, Jose Luis Patino-Andres, Juan Jose Ramirez-Sanchis, and Pekka Toivanen. 2013. Security Threats in Zigbee-Enabled Systems: Vunerability Evaluation, Practical Experiments, Countermeasures, and Lessons Learned. In 2013 46th Hawaii International Conference on System Sciences (HICSS).
[72]
K. Vivek Raj, P. Dinesha, and S. I. Arpitha Shankar. 2022. Security Considerations in the Design of IEEE 802.15.4 Transceiver: A Review. In Cyber Security and Digital Forensics, Kavita Khanna, Vania Vieira Estrela, and Joel José Puga Coelho Rodrigues (Eds.). Springer Singapore, Singapore, 213--229.
[73]
Artemios G. Voyiatzis, Konstantinos Katsigiannis, and Stavros Koubias. 2015. A Modbus/TCP Fuzzer for Testing Internetworked Industrial Systems. In IEEE 20th Conference on Emerging Technologies & Factory Automation (ETFA).
[74]
Weicheng Wang, Fabrizio Cicala, Syed Rafiul Hussain, Elisa Bertino, and Ninghui Li. 2020. Analyzing the Attack Landscape of Zigbee-Enabled IoT Systems and Reinstating Users' Privacy. In 13th Conference on Security and Privacy in Wireless and Mobile Networks (WiSec).
[75]
WIOMAX. 2016. Key Applications of the Smart IoT to Transform Transportation. http://www.wiomax.com/what-can-the-smart-iot-transform-transportationand-smart-cities/. (2016).
[76]
Network World. 2020. What 5G Promises for IoT. https://www.networkworld.c om/article/3584385/what-5g-brings-to-iot-today-and-tomorrow.html. (2020).
[77]
Joshua Wright. 2009. KillerBee: Practical ZigBee Exploitation Framework. http://www.willhackforsushi.com/presentations/toorcon11-wright.pdf. (2009).
[78]
Xie Xiao-Feng and Wang Zun-Jing. 2017. Integrated in-Vehicle Decision Support System for Driving at Signalized Intersections: A Prototype of Smart IoT in Transportation. In Transportation Research Board (TRB) Annual Meeting.
[79]
Chen Yang, Weiming Shen, and Xianbin Wang. 2018. The Internet of Things in Manufacturing: Key Issues and Potential Applications. IEEE Systems, Man, and Cybernetics Magazine (2018), 6--15.
[80]
Jingling Zhao, Shilei Chen, Shurui Liang, Baojiang Cui, and Xiaolong Song. 2013. RFSM-Fuzzing a Smart Fuzzing Algorithm Based on Regression FSM. In 2013 Eighth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC).
[81]
Tobias Zillner. 2015. ZigBee Exploited: The Good the Bad and the Ugly. In Black Hat USA. https://www.blackhat.com/docs/us-15/materials/us-15-ZillnerZigBee-Exploited-The-Good-The-Bad-And-The-Ugly-wp.pdf

Cited By

View all
  • (2024)Survey of Side-Channel Vulnerabilities for Short-Range Wireless Communication Technologies2024 IEEE International Conference on Electro Information Technology (eIT)10.1109/eIT60633.2024.10609924(450-456)Online publication date: 30-May-2024
  • (2024)LLMIF: Augmented Large Language Model for Fuzzing IoT Devices2024 IEEE Symposium on Security and Privacy (SP)10.1109/SP54263.2024.00211(881-896)Online publication date: 19-May-2024
  • (2024)On Building Automation Systems and Attacks2024 International Conference on Computing, Networking and Communications (ICNC)10.1109/ICNC59896.2024.10555990(536-542)Online publication date: 19-Feb-2024
  • Show More Cited By

Index Terms

  1. Don't Kick Over the Beehive: Attacks and Security Analysis on Zigbee

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    CCS '22: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security
    November 2022
    3598 pages
    ISBN:9781450394505
    DOI:10.1145/3548606
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 07 November 2022

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. security
    2. semantic-aware fuzzing
    3. zigbee

    Qualifiers

    • Research-article

    Funding Sources

    Conference

    CCS '22
    Sponsor:

    Acceptance Rates

    Overall Acceptance Rate 1,261 of 6,999 submissions, 18%

    Upcoming Conference

    CCS '25

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)724
    • Downloads (Last 6 weeks)82
    Reflects downloads up to 09 Jan 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Survey of Side-Channel Vulnerabilities for Short-Range Wireless Communication Technologies2024 IEEE International Conference on Electro Information Technology (eIT)10.1109/eIT60633.2024.10609924(450-456)Online publication date: 30-May-2024
    • (2024)LLMIF: Augmented Large Language Model for Fuzzing IoT Devices2024 IEEE Symposium on Security and Privacy (SP)10.1109/SP54263.2024.00211(881-896)Online publication date: 19-May-2024
    • (2024)On Building Automation Systems and Attacks2024 International Conference on Computing, Networking and Communications (ICNC)10.1109/ICNC59896.2024.10555990(536-542)Online publication date: 19-Feb-2024
    • (2024)On building automation system securityHigh-Confidence Computing10.1016/j.hcc.2024.1002364:3(100236)Online publication date: Sep-2024
    • (2024)Advance comprehensive analysis for Zigbee network-based IoT system securityDiscover Computing10.1007/s10791-024-09456-327:1Online publication date: 24-Jul-2024
    • (2023)IoT Zigbee device security: A comprehensive reviewInternet of Things10.1016/j.iot.2023.10079122(100791)Online publication date: Jul-2023

    View Options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Login options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media