Cargando…
Eavesdropping Vulnerability and Countermeasure in Infrared Communication for IoT Devices
Infrared (IR) communication is one of the wireless communication methods mainly used to manipulate consumer electronics devices. Traditional IR devices support only simple operations such as changing TV channels. These days, consumer electronic devices such as smart TV are connected to the internet...
Autores principales: | , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2021
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8706134/ https://www.ncbi.nlm.nih.gov/pubmed/34960299 http://dx.doi.org/10.3390/s21248207 |
_version_ | 1784622118783156224 |
---|---|
author | Kim, Minchul Suh, Taeweon |
author_facet | Kim, Minchul Suh, Taeweon |
author_sort | Kim, Minchul |
collection | PubMed |
description | Infrared (IR) communication is one of the wireless communication methods mainly used to manipulate consumer electronics devices. Traditional IR devices support only simple operations such as changing TV channels. These days, consumer electronic devices such as smart TV are connected to the internet with the introduction of IoT. Thus, the user’s sensitive information such as credit card number and/or personal information could be entered with the IR remote. This situation raises a new problem. Since TV and the set-top box are visual media, these devices can be used to control and/or monitor other IoT devices at home. Therefore, personal information can be exposed to eavesdroppers. In this paper, we experimented with the IR devices’ reception sensitivity using remotes. These experiments were performed to measure the IR reception sensitivity in terms of distance and position between the device and the remote. According to our experiments, the transmission distance of the IR remote signal is more than 20 m. The experiments also revealed that curtains do not block infrared rays. Consequently, eavesdropping is possible to steal the user’s sensitive information. This paper proposes a simple, practical, and cost-effective countermeasure against eavesdropping, which does not impose any burden on users. Basically, encryption is used to prevent the eavesdropping. The encryption key is created by recycling a timer inside the microcontroller typically integrated in a remote. The key is regenerated whenever the power button on a remote is pressed, providing the limited lifecycle of the key. The evaluation indicates that the XOR-based encryption is practical and effective in terms of the processing time and cost. |
format | Online Article Text |
id | pubmed-8706134 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2021 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-87061342021-12-25 Eavesdropping Vulnerability and Countermeasure in Infrared Communication for IoT Devices Kim, Minchul Suh, Taeweon Sensors (Basel) Article Infrared (IR) communication is one of the wireless communication methods mainly used to manipulate consumer electronics devices. Traditional IR devices support only simple operations such as changing TV channels. These days, consumer electronic devices such as smart TV are connected to the internet with the introduction of IoT. Thus, the user’s sensitive information such as credit card number and/or personal information could be entered with the IR remote. This situation raises a new problem. Since TV and the set-top box are visual media, these devices can be used to control and/or monitor other IoT devices at home. Therefore, personal information can be exposed to eavesdroppers. In this paper, we experimented with the IR devices’ reception sensitivity using remotes. These experiments were performed to measure the IR reception sensitivity in terms of distance and position between the device and the remote. According to our experiments, the transmission distance of the IR remote signal is more than 20 m. The experiments also revealed that curtains do not block infrared rays. Consequently, eavesdropping is possible to steal the user’s sensitive information. This paper proposes a simple, practical, and cost-effective countermeasure against eavesdropping, which does not impose any burden on users. Basically, encryption is used to prevent the eavesdropping. The encryption key is created by recycling a timer inside the microcontroller typically integrated in a remote. The key is regenerated whenever the power button on a remote is pressed, providing the limited lifecycle of the key. The evaluation indicates that the XOR-based encryption is practical and effective in terms of the processing time and cost. MDPI 2021-12-08 /pmc/articles/PMC8706134/ /pubmed/34960299 http://dx.doi.org/10.3390/s21248207 Text en © 2021 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Article Kim, Minchul Suh, Taeweon Eavesdropping Vulnerability and Countermeasure in Infrared Communication for IoT Devices |
title | Eavesdropping Vulnerability and Countermeasure in Infrared Communication for IoT Devices |
title_full | Eavesdropping Vulnerability and Countermeasure in Infrared Communication for IoT Devices |
title_fullStr | Eavesdropping Vulnerability and Countermeasure in Infrared Communication for IoT Devices |
title_full_unstemmed | Eavesdropping Vulnerability and Countermeasure in Infrared Communication for IoT Devices |
title_short | Eavesdropping Vulnerability and Countermeasure in Infrared Communication for IoT Devices |
title_sort | eavesdropping vulnerability and countermeasure in infrared communication for iot devices |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8706134/ https://www.ncbi.nlm.nih.gov/pubmed/34960299 http://dx.doi.org/10.3390/s21248207 |
work_keys_str_mv | AT kimminchul eavesdroppingvulnerabilityandcountermeasureininfraredcommunicationforiotdevices AT suhtaeweon eavesdroppingvulnerabilityandcountermeasureininfraredcommunicationforiotdevices |