REMOVING RF VULNERABILITIES FROM IOT DEVICES

被引:0
作者
Ray, Pranab [1 ]
Sultana, Parveen H. [1 ]
Ghosh, Sushmita [1 ]
机构
[1] Vellore Inst Technol, Vellore 632014, Tamil Nadu, India
来源
2ND INTERNATIONAL CONFERENCE ON RECENT TRENDS IN ADVANCED COMPUTING ICRTAC -DISRUP - TIV INNOVATION , 2019 | 2019年 / 165卷
关键词
Radio frequency (RF); key rolling algorithm; 3 way handshaking; Acknowledgment (ACK); Synchronized (SYN); Television(TV); Air conditioning(AC); A random secret unique code (Key);
D O I
10.1016/j.procs.2020.01.001
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
RF vulnerabilities is a massive problem nowadays. If you see TV remote, AC remote, camera and car remotes RE have been using everywhere. The problem with RE security is that it always generates a signal with the same key which locked or unlock the system. RF signals are also unencrypted and It transfers signal through an unsecured channel so It suffers from key relay attack where the same key signal used to generate every time from a captured RF signal having the same key to make work to the system. Our problem statement is "Removing RF vulnerabilities to transfer data securely so that RF can avoid any types of relay attack threats". we proposed a system which transferred data securely, In our system, we advise key rolling algorithm with a 2 way handshake, Key rolling algorithm rolls key which provides a new key every time of data transferming and 2-way handshaking provide synchronization between sender and receiver. (C) 2019 The Authors. Published by Elsevier B.V.
引用
收藏
页码:421 / 427
页数:7
相关论文
empty
未找到相关数据