REMOVING RF VULNERABILITIES FROM IOT DEVICES

被引:0
|
作者
Ray, Pranab [1 ]
Sultana, Parveen H. [1 ]
Ghosh, Sushmita [1 ]
机构
[1] Vellore Inst Technol, Vellore 632014, Tamil Nadu, India
关键词
Radio frequency (RF); key rolling algorithm; 3 way handshaking; Acknowledgment (ACK); Synchronized (SYN); Television(TV); Air conditioning(AC); A random secret unique code (Key);
D O I
10.1016/j.procs.2020.01.001
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
RF vulnerabilities is a massive problem nowadays. If you see TV remote, AC remote, camera and car remotes RE have been using everywhere. The problem with RE security is that it always generates a signal with the same key which locked or unlock the system. RF signals are also unencrypted and It transfers signal through an unsecured channel so It suffers from key relay attack where the same key signal used to generate every time from a captured RF signal having the same key to make work to the system. Our problem statement is "Removing RF vulnerabilities to transfer data securely so that RF can avoid any types of relay attack threats". we proposed a system which transferred data securely, In our system, we advise key rolling algorithm with a 2 way handshake, Key rolling algorithm rolls key which provides a new key every time of data transferming and 2-way handshaking provide synchronization between sender and receiver. (C) 2019 The Authors. Published by Elsevier B.V.
引用
收藏
页码:421 / 427
页数:7
相关论文
共 50 条
  • [41] Charging RF-Energy Harvesting Devices in IoT Networks With Imperfect CSI
    Yu, Hang
    Chin, Kwan-Wu
    Soh, Sieteng
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (18) : 17808 - 17820
  • [42] On the Bulk Ingestion of IoT Devices from Heterogeneous IoT Brokers
    Bonfitto, Sara
    Hachem, Fatima
    Belay, Elefelious Getachew
    Valtoline, Stefano
    Mesiti, Marco
    2019 IEEE INTERNATIONAL CONGRESS ON INTERNET OF THINGS (IEEE ICIOT 2019), 2019, : 189 - 195
  • [43] Healthcare IoT: Benefits, Vulnerabilities and Solutions
    Nausheen, Farha
    Begum, Sayyada Hajera
    PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON INVENTIVE SYSTEMS AND CONTROL (ICISC 2018), 2018, : 517 - 522
  • [44] Comprehensive Study of IoT Vulnerabilities and Countermeasures
    Coston, Ian
    Plotnizky, Eadan
    Nojoumian, Mehrdad
    APPLIED SCIENCES-BASEL, 2025, 15 (06):
  • [45] IoT - Supply Chain Forensics and Vulnerabilities
    Gudlur, Venkata Venugopal Rao
    Shanmugan, Vikneswara Abirama
    Perumal, Sundresan
    Mohammed, Radin Maya Saphira Radin
    2019 1ST INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND DATA SCIENCES (AIDAS2019), 2019, : 106 - 109
  • [46] Static analysis for discovering IoT vulnerabilities
    Pietro Ferrara
    Amit Kr Mandal
    Agostino Cortesi
    Fausto Spoto
    International Journal on Software Tools for Technology Transfer, 2021, 23 : 71 - 88
  • [47] Security Vulnerabilities in Consumer IoT Applications
    Shakdher, Arjun
    Agrawal, Suyash
    Yang, Baijian
    2019 IEEE 5TH INTL CONFERENCE ON BIG DATA SECURITY ON CLOUD (BIGDATASECURITY) / IEEE INTL CONFERENCE ON HIGH PERFORMANCE AND SMART COMPUTING (HPSC) / IEEE INTL CONFERENCE ON INTELLIGENT DATA AND SECURITY (IDS), 2019, : 1 - 6
  • [48] Static analysis for discovering IoT vulnerabilities
    Ferrara, Pietro
    Mandal, Amit Kr
    Cortesi, Agostino
    Spoto, Fausto
    INTERNATIONAL JOURNAL ON SOFTWARE TOOLS FOR TECHNOLOGY TRANSFER, 2021, 23 (01) : 71 - 88
  • [49] Securing IoT/IIoT from Software Attacks Targeting Hardware Vulnerabilities
    Polychronou, Nikolaos Foivos
    Thevenon, Pierre-Henri
    Puys, Maxime
    Beroulle, Vincent
    2021 19TH IEEE INTERNATIONAL NEW CIRCUITS AND SYSTEMS CONFERENCE (NEWCAS), 2021,
  • [50] The Presence, Trends, and Causes of Security Vulnerabilities in Operating Systems of IoT's Low-End Devices
    Al-Boghdady, Abdullah
    Wassif, Khaled
    El-Ramly, Mohammad
    SENSORS, 2021, 21 (07)