Page 61

EETE SEP 2015

A19E_EET_2_37x10_87_A19E.qxd 7/30/15 10:28 AM everybody’s life will be made safer and better--at a price yet to be determined. Along the way, Intel hopes to help accelerate adoption, standardization and intelligent solutions for equipment and device manufacturers, network operators, service providers and academic institutions. Intel is already working alongside the engineering visionaries making 5G happen, including Nokia’s AirFrame Data Center, NTT DoCoMo’s advanced field trials, SK Telecom’s collaborative development of 5G modems using ‘Funtenna’ hack turns IoT devices into radios By Rich Pell Sandra Rivera, vice president of the data center group and general manager of the Internet of Things (IoT) described the benefits of 5G to the users. (Source: Intel) multiple radio access technologies and its Anchor-Booster Cell effort to combine LTE and WiGig. Intel is also a member of a number of research projects including the 5G Public Private Partnership (5GPPP), the Flex5GWare project and Horizon2020. Security researchers have revealed a technique that could allow hackers to steal data from IoT devices by essentially turning them into radios and then listening to the signals they broadcast via a receiver and antenna. The software-based hack - called “Funtenna” - causes an infected computing device to broadcast data via a radio backchannel (or even audio frequencies) to attackers who can monitor it without using standard wireless communication protocols like Wi-Fi and Bluetooth. Using just seven lines of code, the researchers, from security startup Red Balloon Security (New York, NY), were able to turn an otherwise unmodified laser printer into a radio transmitter by rapidly switching the power state of the printer’s I/O ports. The resulting modulated radio signal was broadcast via the wiring and components associated with the printer’s I/O circuitry and connections. The GPIO connections, which had relatively short wires, resulted in a radio transmission of a few meters while the printer’s UART output, which had a 10-foot cable, generated a signal that could be received outside of the building. According to the researchers, who presented their “Funtenna” proof of concept at last week’s Black Hat conference, the same type of attack could be used on almost any IoT device, or devices with onboard computing like network routers. The only real defense against such attacks, they say, needs to be host based and built into embedded devices. “A network intrusion detection system is no substitute for host-based defense,” says Ang Cui, chief scientist at Red Balloon Security. “You could monitor every known spectrum, but it would be very expensive and may not work. The best way is to have host-based defense baked into every embedded device.” SU RFA CE MO U NT ( a nd thru -h o le) Tr a nsf or me r s & I n d u c t o r s Size does matter! from lowprofile .18"ht. • Audio Transformers • Pulse Transformers • DC-DC Converter Transformers • MultiPlex Data Bus Transformers • Power & EMI Inductors See Pico’s fu ll Catalo g im me diately w w w . p i c o e l e c t r on i c s . c o m PICO Electronics,Inc. 143 Sparks Ave. Pelham, N.Y. 10803 E Mail: info@picoelectronics.com Pico Representatives Germany ELBV/Electronische Bauelemente Vertrieb E-mail: info@elbv.de Phone: 0049 89 4602852 Fax: 0049 89 46205442 England Ginsbury Electronics Ltd. E-mail: rbennett@ginsbury.co.uk Phone: 0044 1634 298900 Fax: 0044 1634 290904 www.electronics-eetimes.com Electronic Engineering Times Europe September 2015 43


EETE SEP 2015
To see the actual publication please follow the link above