Header menu link for other important links
X
REMOVING RF VULNERABILITIES from IOT DEVICES
P. Ray, , S. Ghosh
Published in Elsevier B.V.
2019
Volume: 165
   
Pages: 421 - 427
Abstract
RF vulnerabilities is a massive problem nowadays. If you see TV remote, AC remote, camera and car remotes RF have been using everywhere. The problem with RF security is that it always generates a signal with the same key which locked or unlock the system. RF signals are also unencrypted and It transfers signal through an unsecured channel so It suffers from key relay attack where the same key signal used to generate every time from a captured RF signal having the same key to make work to the system. Our problem statement is "Removing RF vulnerabilities to transfer data securely so that RF can avoid any types of relay attack threats". we proposed a system which transferred data securely, In our system, we advise key rolling algorithm with a 2-way handshake, Key rolling algorithm rolls key which provides a new key every time of data transferring and 2-way handshaking provide synchronization between sender and receiver. © 2019 Procedia Computer Science. All rights reserved.
About the journal
JournalData powered by TypesetProcedia Computer Science
PublisherData powered by TypesetElsevier B.V.
ISSN18770509