REMOVING RF VULNERABILITIES FROM IOT DEVICES

被引:0
|
作者
Ray, Pranab [1 ]
Sultana, Parveen H. [1 ]
Ghosh, Sushmita [1 ]
机构
[1] Vellore Inst Technol, Vellore 632014, Tamil Nadu, India
关键词
Radio frequency (RF); key rolling algorithm; 3 way handshaking; Acknowledgment (ACK); Synchronized (SYN); Television(TV); Air conditioning(AC); A random secret unique code (Key);
D O I
10.1016/j.procs.2020.01.001
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
RF vulnerabilities is a massive problem nowadays. If you see TV remote, AC remote, camera and car remotes RE have been using everywhere. The problem with RE security is that it always generates a signal with the same key which locked or unlock the system. RF signals are also unencrypted and It transfers signal through an unsecured channel so It suffers from key relay attack where the same key signal used to generate every time from a captured RF signal having the same key to make work to the system. Our problem statement is "Removing RF vulnerabilities to transfer data securely so that RF can avoid any types of relay attack threats". we proposed a system which transferred data securely, In our system, we advise key rolling algorithm with a 2 way handshake, Key rolling algorithm rolls key which provides a new key every time of data transferming and 2-way handshaking provide synchronization between sender and receiver. (C) 2019 The Authors. Published by Elsevier B.V.
引用
收藏
页码:421 / 427
页数:7
相关论文
共 50 条
  • [31] Multiband Ambient RF Energy Harvesting for Autonomous IoT Devices
    Vu, Hong Son
    Nguyen, Ngan
    Ha-Van, Nam
    Seo, Chulhun
    Thuy Le, Minh
    IEEE MICROWAVE AND WIRELESS COMPONENTS LETTERS, 2020, 30 (12) : 1189 - 1192
  • [32] REMOVING THE MACRAME FROM MONITORING DEVICES
    CLAEYS, DW
    ANESTHESIA AND ANALGESIA, 1987, 66 (07): : 695 - 696
  • [33] Removing Software Vulnerabilities During Design
    Yee, George O. M.
    2018 IEEE 42ND ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE (COMPSAC 2018), VOL 2, 2018, : 504 - 509
  • [34] Discovering Vulnerabilities in COTS IoT Devices through Blackbox Fuzzing Web Management Interface
    Wang, Dong
    Zhang, Xiaosong
    Chen, Ting
    Li, Jingwei
    SECURITY AND COMMUNICATION NETWORKS, 2019, 2019
  • [35] RF Power Transmission for Self-sustaining Miniaturized IoT Devices
    Schulthess, Lukas
    Villani, Federico
    Mayer, Philipp
    Magno, Michele
    2022 29TH IEEE INTERNATIONAL CONFERENCE ON ELECTRONICS, CIRCUITS AND SYSTEMS (IEEE ICECS 2022), 2022,
  • [36] RF Co-existence Testing for IoT wireless medical devices
    Chew, Kah-Meng
    Kelly, Chris
    2018 IEEE INTERNATIONAL SYMPOSIUM ON MEDICAL MEASUREMENTS AND APPLICATIONS (MEMEA), 2018, : 608 - 612
  • [37] Analysis of the vulnerabilities of the embedded information systems of IoT-devices through the honeypot network implementation
    Iskhakova, Anastasia
    Meshcheryakov, Roman
    Iskhakov, Andrey
    Timchenko, Sergey
    PROCEEDINGS OF THE IV INTERNATIONAL RESEARCH CONFERENCE INFORMATION TECHNOLOGIES IN SCIENCE, MANAGEMENT, SOCIAL SPHERE AND MEDICINE (ITSMSSM 2017), 2017, 72 : 363 - 367
  • [38] SEAL-RF: Secure Adiabatic Logic for Wirelessly Powered IoT Devices
    Dhananjay, Krithika
    Salman, Emre
    IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (02) : 1112 - 1123
  • [39] Zero Energy IoT Devices in Smart Cities Using RF Energy Harvesting
    Zeb, Hassan
    Gohar, Moneeb
    Ali, Moazam
    Rahman, Arif Ur
    Ahmad, Waleed
    Ghani, Anwar
    Choi, Jin-Ghoo
    Koh, Seok-Joo
    ELECTRONICS, 2023, 12 (01)
  • [40] Intrusion Detection for IoT Devices based on RF Fingerprinting using Deep Learning
    Bassey, Joshua
    Adesina, Damilola
    Li, Xiangfang
    Qian, Lijun
    Aved, Alexander
    Kroecker, Timothy
    2019 FOURTH INTERNATIONAL CONFERENCE ON FOG AND MOBILE EDGE COMPUTING (FMEC), 2019, : 98 - 104