Skip to Content

Sniffing Radio-Frequency Emissions to Secure the Internet of Things

Monitoring the usual behavior of Internet-connected devices could make it possible to detect malicious activity.
January 28, 2015

A startup called Bastille says it can help companies detect the hacking of devices connected to the so-called Internet of things, which is looming larger as a target for computer crimes.

Bastille Networks measures the typical radio-frequency signature of all the devices in an office—sensors, industrial control systems, employees’ phones, their fitness bands, Wi-Fi routers, and so on. If anything unusual develops, because a sniffing device has been placed in the office, for example, or because someone appears to be remotely accessing an Internet-of-things-connected device for malicious purposes, Bastille can tell the IT staff. Bastille has been testing its technology with some financial services companies since December and plans to make its technology available to other companies in late 2015.

Atlanta-based Bastille, founded last year, can spread its radio-frequency sensors throughout an office to monitor connected devices that operate over communication protocols like Wi-Fi, Zigbee, and Bluetooth low-energy, as well as over cellular networks. The company’s software can determine where these devices are located to within three meters. In the pilot test, CEO Chris Rouland says, the sensors are being placed in areas considered most important to secure, like data centers and executive offices.

Matt Reynolds, an associate professor at the University of Washington who researches radio-frequency technologies, says that one challenge in using radio-frequency monitoring is that not all devices advertise their presence by emitting signals. Some could be set to wake up only when triggered by an attacker. “The mere fact that the device is not advertising its presence doesn’t mean it’s not present and listening,” he says (see “Internet of Treacherous Things”).

“Just like the rest of the Internet, the advantage is on the attacker,” Reynolds says.

Keep Reading

Most Popular

This new data poisoning tool lets artists fight back against generative AI

The tool, called Nightshade, messes up training data in ways that could cause serious damage to image-generating AI models. 

Rogue superintelligence and merging with machines: Inside the mind of OpenAI’s chief scientist

An exclusive conversation with Ilya Sutskever on his fears for the future of AI and why they’ve made him change the focus of his life’s work.

Data analytics reveal real business value

Sophisticated analytics tools mine insights from data, optimizing operational processes across the enterprise.

The Biggest Questions: What is death?

New neuroscience is challenging our understanding of the dying process—bringing opportunities for the living.

Stay connected

Illustration by Rose Wong

Get the latest updates from
MIT Technology Review

Discover special offers, top stories, upcoming events, and more.

Thank you for submitting your email!

Explore more newsletters

It looks like something went wrong.

We’re having trouble saving your preferences. Try refreshing this page and updating them one more time. If you continue to get this message, reach out to us at customer-service@technologyreview.com with a list of newsletters you’d like to receive.