Security researchers have developed a Flying Drone with a custom-made tracking tool capable of sniffing out data from the devices connected to the Internet – better known as the Internet-of-things.

Under its Internet of Things Map Project, a team of security researchers at the Texas-based firm Praetorian wanted to create a searchable database that will be the Shodan search engine for SCADA devices.

Located More Than 1600+ Devices Using Drone

To make it possible, the researchers devised a drone with their custom built connected-device tracking appliance and flew it over Austin, Texas in real time.

During an 18 minute flight, the drone found nearly 1,600 Internet-connected devices, of which 453 IoT devices are made by Sony and 110 by Philips. You can see the full Austin map here.

How did They locate Internet of Things Devices?

The researchers located all ZigBee-enabled smart devices and networks and then started expanding their research.

"When [IoT devices] communicated over a wireless protocol called ZigBee, this protocol is open at a network level. So when the devices start connecting, they send out beacon requests. We capture data based on this," says Paul West Jauregui, from Praetorian.

ZigBee is a popular smart-home wireless communication standard used by the majority of Internet of Things (IoT) devices today.

ZigBee protocol, which lets IoT devices talk to each other, is implemented by major vendors including Toshiba, Philips, Huawei, Sony, Siemens, Samsung, Motorola, and many more.

Exploiting 'ZigBee' to Hack Internet of Things Devices Remotely

Such drone experiments could be even worse if hackers were able to hijack smart-home and Internet-enabled appliances remotely...

…that's Evil! But it has been demonstrated by a Vienna-based team of security researchers at Black Hat security conference.
Tobias Zillner and Sebastian Strobl from 'Cognosec' have discovered some critical security flaws in ZigBee that could allow hackers to compromise ZigBee networks and take over control of all connected devices on a network, including door locks, alarm system and even controlling your light bulbs.

The vulnerability actually relies in the way ZigBee protocol handles the keys it uses to authenticate the IoT devices it adds to its mesh network, allowing hackers to sniff out exchange authenticate keys.
"Tests with light bulbs, temperature sensors, motion sensors and even door locks have shown that the vendors of the tested devices implemented [minimum features] required to be certified," says Zillner.
Even Worse:

The worse part pointed out by the researcher is that there is nothing users could do to make their smart devices more secure, and since the flaw affects a broad range of devices, it's quite unclear how quickly vendors will come up with a fix.

Found this article interesting? Follow us on Twitter and LinkedIn to read more exclusive content we post.