REMOVING RF VULNERABILITIES FROM IOT DEVICES

被引:0
|
作者
Ray, Pranab [1 ]
Sultana, Parveen H. [1 ]
Ghosh, Sushmita [1 ]
机构
[1] Vellore Inst Technol, Vellore 632014, Tamil Nadu, India
关键词
Radio frequency (RF); key rolling algorithm; 3 way handshaking; Acknowledgment (ACK); Synchronized (SYN); Television(TV); Air conditioning(AC); A random secret unique code (Key);
D O I
10.1016/j.procs.2020.01.001
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
RF vulnerabilities is a massive problem nowadays. If you see TV remote, AC remote, camera and car remotes RE have been using everywhere. The problem with RE security is that it always generates a signal with the same key which locked or unlock the system. RF signals are also unencrypted and It transfers signal through an unsecured channel so It suffers from key relay attack where the same key signal used to generate every time from a captured RF signal having the same key to make work to the system. Our problem statement is "Removing RF vulnerabilities to transfer data securely so that RF can avoid any types of relay attack threats". we proposed a system which transferred data securely, In our system, we advise key rolling algorithm with a 2 way handshake, Key rolling algorithm rolls key which provides a new key every time of data transferming and 2-way handshaking provide synchronization between sender and receiver. (C) 2019 The Authors. Published by Elsevier B.V.
引用
收藏
页码:421 / 427
页数:7
相关论文
共 50 条
  • [1] Vulnerabilities in Hub Architecture IoT Devices
    Visan, Bogdan Alexandru
    Lee, Jiyoon
    Yang, Baijian
    Smith, Anthony H.
    Matson, Eric T.
    2017 14TH IEEE ANNUAL CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE (CCNC), 2017, : 83 - 88
  • [2] Analysis of Security Vulnerabilities for IoT Devices
    Kim, Hee-Hyun
    Yoo, Jinho
    JOURNAL OF INFORMATION PROCESSING SYSTEMS, 2022, 18 (04): : 489 - 499
  • [3] On the impact of kernel code vulnerabilities in IoT devices
    Eresheim, Sebastian
    Luh, Robert
    Schrittwieser, Sebastian
    PROCEEDINGS 2017 INTERNATIONAL CONFERENCE ON SOFTWARE SECURITY AND ASSURANCE (ICSSA), 2017, : 1 - 5
  • [4] Vulnerabilities in IoT Devices for Smart Home Environment
    Costa, Luis
    Barros, Joao Paulo
    Tavares, Miguel
    PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY (ICISSP), 2019, : 615 - 622
  • [5] Vulnerabilities in IoT Devices with Software-Defined Radio
    Phan Duy Hung
    Bui Trong Vinh
    2019 IEEE 4TH INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION SYSTEMS (ICCCS 2019), 2019, : 664 - 668
  • [6] An Experimental Analysis of Security Vulnerabilities in Industrial IoT Devices
    Jiang, Xingbin
    Lora, Michele
    Chattopadhyay, Sudipta
    ACM TRANSACTIONS ON INTERNET TECHNOLOGY, 2020, 20 (02)
  • [7] Toward Automatically Connecting IoT Devices with Vulnerabilities in the Wild
    Song, Jinke
    Wan, Shangfeng
    Huang, Min
    Liu, Jiqiang
    Sun, Limin
    Li, Qiang
    ACM TRANSACTIONS ON SENSOR NETWORKS, 2024, 20 (01)
  • [8] IoT: Internet of Threats? A Survey of Practical Security Vulnerabilities in Real IoT Devices
    Meneghello, Francesca
    Calore, Matteo
    Zucchetto, Daniel
    Polese, Michele
    Zanella, Andrea
    IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (05): : 8182 - 8201
  • [9] A View on Vulnerabilities Within IoT Devices in the Smart Home Environment
    Nykanen, Annika
    Costin, Andrei
    BUSINESS MODELING AND SOFTWARE DESIGN, BMSD 2023, 2023, 483 : 365 - 374
  • [10] Safety Methodology for IoT Devices Based on Vulnerabilities in Agricultural Environments
    Gomez, Jorge
    Angel Zuniga, Miguel
    Fernandez, Alexander
    APPLIED TECHNOLOGIES (ICAT 2019), PT III, 2020, 1195 : 3 - 12