Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Eavesdropping Vulnerability and Countermeasure in Infrared Communication for IoT Devices

Full metadata record
DC Field Value Language
dc.contributor.authorKim, Minchul-
dc.contributor.authorSuh, Taeweon-
dc.date.accessioned2022-02-12T17:40:59Z-
dc.date.available2022-02-12T17:40:59Z-
dc.date.created2022-02-09-
dc.date.issued2021-12-
dc.identifier.issn1424-8220-
dc.identifier.urihttps://scholar.korea.ac.kr/handle/2021.sw.korea/135528-
dc.description.abstractInfrared (IR) communication is one of the wireless communication methods mainly used to manipulate consumer electronics devices. Traditional IR devices support only simple operations such as changing TV channels. These days, consumer electronic devices such as smart TV are connected to the internet with the introduction of IoT. Thus, the user's sensitive information such as credit card number and/or personal information could be entered with the IR remote. This situation raises a new problem. Since TV and the set-top box are visual media, these devices can be used to control and/or monitor other IoT devices at home. Therefore, personal information can be exposed to eavesdroppers. In this paper, we experimented with the IR devices' reception sensitivity using remotes. These experiments were performed to measure the IR reception sensitivity in terms of distance and position between the device and the remote. According to our experiments, the transmission distance of the IR remote signal is more than 20 m. The experiments also revealed that curtains do not block infrared rays. Consequently, eavesdropping is possible to steal the user's sensitive information. This paper proposes a simple, practical, and cost-effective countermeasure against eavesdropping, which does not impose any burden on users. Basically, encryption is used to prevent the eavesdropping. The encryption key is created by recycling a timer inside the microcontroller typically integrated in a remote. The key is regenerated whenever the power button on a remote is pressed, providing the limited lifecycle of the key. The evaluation indicates that the XOR-based encryption is practical and effective in terms of the processing time and cost.-
dc.languageEnglish-
dc.language.isoen-
dc.publisherMDPI-
dc.titleEavesdropping Vulnerability and Countermeasure in Infrared Communication for IoT Devices-
dc.typeArticle-
dc.contributor.affiliatedAuthorSuh, Taeweon-
dc.identifier.doi10.3390/s21248207-
dc.identifier.scopusid2-s2.0-85121046872-
dc.identifier.wosid000742741500001-
dc.identifier.bibliographicCitationSENSORS, v.21, no.24-
dc.relation.isPartOfSENSORS-
dc.citation.titleSENSORS-
dc.citation.volume21-
dc.citation.number24-
dc.type.rimsART-
dc.type.docTypeArticle-
dc.description.journalClass1-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaChemistry-
dc.relation.journalResearchAreaEngineering-
dc.relation.journalResearchAreaInstruments & Instrumentation-
dc.relation.journalWebOfScienceCategoryChemistry, Analytical-
dc.relation.journalWebOfScienceCategoryEngineering, Electrical & Electronic-
dc.relation.journalWebOfScienceCategoryInstruments & Instrumentation-
dc.subject.keywordAuthorinfrared communication-
dc.subject.keywordAuthoreavesdropping-
dc.subject.keywordAuthorsecurity-
dc.subject.keywordAuthorsecure IoT system-
Files in This Item
There are no files associated with this item.
Appears in
Collections
Graduate School > Department of Computer Science and Engineering > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Suh, Tae weon photo

Suh, Tae weon
컴퓨터학과
Read more

Altmetrics

Total Views & Downloads

BROWSE