Exploring the Path Loss of a Hacking Tool for Security Matters in the Internet of Things
Conference Paper
Overview
Research
Identity
Additional Document Info
View All
Overview
abstract
The rapid expansion of the Internet of Things (IoT), now with billions of mainly wireless interconnected devices, has brought concerns and challenges regarding the security of IoT networks and devices, as they are often vulnerable to attacks. In this article, a measurement campaign is carried out to investigate the path loss experienced by a portable IoT hacking tool, known commercially as Flipper Zero™, when used in transmitter mode, to shed light on the maximum achievable distance at which an IoT device can still receive an eavesdropper’s signal above a minimum power level. The path loss measurements are performed in three different outdoor environments. The results show that the hacking tool transmitted signal can reach up to 15 meters with power above -90 dBm, which is still in the sensitivity range of many IoT devices, thus revealing potential vulnerabilities and security risks in real-world scenarios.