I. Introduction
Smart homes have wireless devices, which are equipped with various sensors to monitor home environment for control or automation to improve one's living experience. All of the devices in a smart home create a wireless sensor network (WSN). These WSNs can utilize an assortment of wireless protocols such as ZigBee, Bluetooth, and Z-Wave. In the Internet of Things (IoT) industry, ZigBee is one of the most widely used technologies for short range wireless data transfer using radio frequency waves. This is because ZigBee devices create Mesh Networks that can range from simple single-hop star topologies to more complex multi-hop mesh Networks [1]. Moreover, most Home Area Networks (HAN) have a star topology with one node that acts as both the coordinator and the gateway. HAN is also responsible for assigning device addresses as well as converting the ZigBee protocol to Internet Protocol (IP), and vice versa. This coordinator node in a HAN will also act as the Trust Center for the WSN, which is in charge of creating and distributing keys to any possible routers and each of the end nodes. Naturally such coordinator nodes are primary target for malicious attacks.