“Intelligence” is a very hot topic recently. Some terms are smart city, smart family, smart carrier, smart factory… The representative term for the smart life in the future is the IoT application. Great resources are used by the government and civil entities to promote and implement such concept and changes caused by the technology are highly expected. The once-again combination of security and intelligence needs to be faced seriously, which means in Chinese that this must not be an awesome future.
In terms of technical protocol and integrated application, there are LoRa, LoRa Wan, Zigbee, BLE and BL in addition to Wi Fi agreement based on 802.11x. Even techniques deeply applied to the SCADA industrial data acquisition and monitoring system are important technical terms for our future intelligence life. Good application and development are always associated with the problem and risk of insecurity and we must not deceive ourselves. Many data security experts or hackers already paid attention to such data security risk. No enterprise or organization was willing to become the party involved in a news event and would rather not be willing to become the party involved in an international classic case or bear huge penalty losses.
Based on accumulated tricks and cases, several reasonable positions for breach and destruction can be structurally summarized from artificial tricks or worm scanning infection: cloud intrusion, long-range intrusion and nearby-factory intrusion. Attention must be paid to these three positions. Additionally, it is necessary to set the security strength of the device itself into the product and the philosophy of saving costs should be broken through. Disadvantages and advantages can be weighed by comparing the penalty with the cost of security product.
After analysis of the trick for nearby sniffing, it was concluded that such software or hardware tools as SDR, AttifyZigbee Framework, Ubertooth One, Pineapple, etc. and replay attack are common intrusion methods used by the hackers. In the long range and on the cloud, the security and network security of the cloud service or relevant application systems of each enterprise are tested. Security vulnerabilities should not be identified easily. Greater importance should be attached to the smart factory, so attention needs to be paid to the intelligence environment combined with the industrial control system.
Taking blue-tooth spying as an example, Blue-tooth is the well known protocol. A hacker uses the TI-CC2540 blue-tooth module with low power consumption which is combined with the SmartRFPACKET-SNIFFER monitor software to sniff three blue-tooth broadcast channels. (among 40 channels: 37, 38 and 39 are used for broadcasting and other 37 channels are used for data transmission). The HackRF BTLE may also be used as alternate to capture blue-tooth packet in the communication. The Ubertooth One must be applied and environment should be set up: Python & libn1-dev, libusb, libbtbb, ubertooth, wireshark, kismet and BLE crack tools crackle must be installed. This shows the awkward situation and shortcomings that we had with respect to the “intelligence” field domain and information security.
I summarized relevant sniffing tools on the Internet. There are approximately 78 types of tool software. In terms of hardware for hackers, there were nearly 20 types of sniffing devices by the end of 2017. Therefore, more efforts must be spent on the data security environment for intelligence factory and intelligence office to meet some security requirements. Although perfection is not achieved, risks must be positively faced.