Jan 2019 AST Magazine Jan 2019 AST Magazine | Page 10

www.AmericanSecurityToday.com January 2019 - Edition 31 www.AmericanSecurityT of the shadow control devices are typically proprietary and tem into reporting the status their short over-the-air time makes demodu- device instead. lation via commercial radio sniffing devices Properly designed equipment will limit access extremely difficult. to whitelisted equipment via unique identi- As the encryption is virtually unbreakable, fiers embedded into the physical hardware would-be attackers would likely try other components during manufacturing. disruptive approaches: Another, albeit difficult variation on this attack, Replay attackĀ  is cloning a device to use the same identifier. This attack involves recording and replaying In this case, two simultaneous radio broadcasts encrypted radio traffic that is not understood using the same identifier would result in RF in- in an attempt to confuse or break the system. terference alarms being generated. This attack can be thwarted by including se- Doing More with Less quence checking in the underlying protocol. Device swapping or cloning Security professionals, by trade, should be cautious when using new technology to secure sites. Device swapping consists of someone at- tempting to use similar equipment running At the same time, new technology is a driv- on the same radio channel to trick the sys- ing force behind better security and en- 8