Exploring the Path Loss of a Hacking Tool for Security Matters in the Internet of Things

2023 IEEE International Autumn Meeting on Power, Electronics and Computing (ROPEC)(2023)

引用 0|浏览0
暂无评分
摘要
The rapid expansion of the Internet of Things (IoT), now with billions of mainly wireless interconnected devices, has brought concerns and challenges regarding the security of IoT networks and devices, as they are often vulnerable to attacks. In this article, a measurement campaign is carried out to investigate the path loss experienced by a portable IoT hacking tool, known commercially as Flipper Zero™, when used in transmitter mode, to shed light on the maximum achievable distance at which an IoT device can still receive an eavesdropper’s signal above a minimum power level. The path loss measurements are performed in three different outdoor environments. The results show that the hacking tool transmitted signal can reach up to 15 meters with power above -90 dBm, which is still in the sensitivity range of many IoT devices, thus revealing potential vulnerabilities and security risks in real-world scenarios.
更多
查看译文
关键词
Internet Of Things,Path Loss,Maximum Distance,Internet Of Things Devices,Security Risks,Potential Vulnerability,Internet Of Things Networks,Potential Security,Security Devices,Portable Tool,Spectroscopy,Empirical Data,Radiofrequency,Output Power,Transmission Power,Pure Tone,Noise Power,Radio Frequency Identification,Modulation Scheme,Physical Layer,Radio Frequency Signal,Direct Line Of Sight,Path Loss Model,Crowded Areas,Internet Of Things Sensors,Theoretical Loss,Exact Distance,Busy Roads,Wireless Devices,Near Field Communication
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要