• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

物联网设备红外通信中的窃听漏洞与对策

Eavesdropping Vulnerability and Countermeasure in Infrared Communication for IoT Devices.

作者信息

Kim Minchul, Suh Taeweon

机构信息

Department of Information Security, Korea University, 145 Anam-ro, Seongbuk-gu, Seoul 02841, Korea.

Department of Computer Science and Engineering, Korea University, 145 Anam-ro, Seongbuk-gu, Seoul 02841, Korea.

出版信息

Sensors (Basel). 2021 Dec 8;21(24):8207. doi: 10.3390/s21248207.

DOI:10.3390/s21248207
PMID:34960299
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC8706134/
Abstract

Infrared (IR) communication is one of the wireless communication methods mainly used to manipulate consumer electronics devices. Traditional IR devices support only simple operations such as changing TV channels. These days, consumer electronic devices such as smart TV are connected to the internet with the introduction of IoT. Thus, the user's sensitive information such as credit card number and/or personal information could be entered with the IR remote. This situation raises a new problem. Since TV and the set-top box are visual media, these devices can be used to control and/or monitor other IoT devices at home. Therefore, personal information can be exposed to eavesdroppers. In this paper, we experimented with the IR devices' reception sensitivity using remotes. These experiments were performed to measure the IR reception sensitivity in terms of distance and position between the device and the remote. According to our experiments, the transmission distance of the IR remote signal is more than 20 m. The experiments also revealed that curtains do not block infrared rays. Consequently, eavesdropping is possible to steal the user's sensitive information. This paper proposes a simple, practical, and cost-effective countermeasure against eavesdropping, which does not impose any burden on users. Basically, encryption is used to prevent the eavesdropping. The encryption key is created by recycling a timer inside the microcontroller typically integrated in a remote. The key is regenerated whenever the power button on a remote is pressed, providing the limited lifecycle of the key. The evaluation indicates that the XOR-based encryption is practical and effective in terms of the processing time and cost.

摘要

红外(IR)通信是主要用于操控消费电子设备的无线通信方式之一。传统红外设备仅支持诸如更换电视频道等简单操作。如今,随着物联网的引入,智能电视等消费电子设备已接入互联网。因此,用户的敏感信息如信用卡号和/或个人信息可能会通过红外遥控器输入。这种情况引发了一个新问题。由于电视和机顶盒是视觉媒体,这些设备可用于控制和/或监控家中的其他物联网设备。所以,个人信息可能会暴露给窃听者。在本文中,我们使用遥控器对红外设备的接收灵敏度进行了实验。进行这些实验是为了测量设备与遥控器之间距离和位置方面的红外接收灵敏度。根据我们的实验,红外遥控信号的传输距离超过20米。实验还表明窗帘不会阻挡红外线。因此,窃听有可能窃取用户的敏感信息。本文提出了一种简单、实用且经济高效的防窃听对策,不会给用户带来任何负担。基本上,使用加密来防止窃听。加密密钥通过循环利用通常集成在遥控器中的微控制器内部的定时器来创建。每当按下遥控器上的电源按钮时,密钥就会重新生成,从而提供密钥的有限生命周期。评估表明,基于异或的加密在处理时间和成本方面是实用且有效的。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0620/8706134/10d5115b48cb/sensors-21-08207-g019.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0620/8706134/d70ce364c698/sensors-21-08207-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0620/8706134/534c2e715398/sensors-21-08207-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0620/8706134/f7d428c1b4db/sensors-21-08207-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0620/8706134/beb8ae846e91/sensors-21-08207-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0620/8706134/879804783134/sensors-21-08207-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0620/8706134/c66d5c6524f0/sensors-21-08207-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0620/8706134/551a15d60935/sensors-21-08207-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0620/8706134/c884420591a2/sensors-21-08207-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0620/8706134/fbb58cd16193/sensors-21-08207-g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0620/8706134/6c1e60469ae5/sensors-21-08207-g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0620/8706134/a91205edca57/sensors-21-08207-g011.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0620/8706134/146def72bc29/sensors-21-08207-g012.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0620/8706134/ad8031f16bff/sensors-21-08207-g013.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0620/8706134/4d0e806fb627/sensors-21-08207-g014.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0620/8706134/fb2cadbbeadf/sensors-21-08207-g015.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0620/8706134/733d7165f449/sensors-21-08207-g016.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0620/8706134/c3cb47c2ef8c/sensors-21-08207-g017.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0620/8706134/dd13fb5d24d2/sensors-21-08207-g018.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0620/8706134/10d5115b48cb/sensors-21-08207-g019.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0620/8706134/d70ce364c698/sensors-21-08207-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0620/8706134/534c2e715398/sensors-21-08207-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0620/8706134/f7d428c1b4db/sensors-21-08207-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0620/8706134/beb8ae846e91/sensors-21-08207-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0620/8706134/879804783134/sensors-21-08207-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0620/8706134/c66d5c6524f0/sensors-21-08207-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0620/8706134/551a15d60935/sensors-21-08207-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0620/8706134/c884420591a2/sensors-21-08207-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0620/8706134/fbb58cd16193/sensors-21-08207-g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0620/8706134/6c1e60469ae5/sensors-21-08207-g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0620/8706134/a91205edca57/sensors-21-08207-g011.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0620/8706134/146def72bc29/sensors-21-08207-g012.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0620/8706134/ad8031f16bff/sensors-21-08207-g013.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0620/8706134/4d0e806fb627/sensors-21-08207-g014.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0620/8706134/fb2cadbbeadf/sensors-21-08207-g015.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0620/8706134/733d7165f449/sensors-21-08207-g016.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0620/8706134/c3cb47c2ef8c/sensors-21-08207-g017.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0620/8706134/dd13fb5d24d2/sensors-21-08207-g018.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0620/8706134/10d5115b48cb/sensors-21-08207-g019.jpg

相似文献

1
Eavesdropping Vulnerability and Countermeasure in Infrared Communication for IoT Devices.物联网设备红外通信中的窃听漏洞与对策
Sensors (Basel). 2021 Dec 8;21(24):8207. doi: 10.3390/s21248207.
2
A Physical-Layer Security Cooperative Framework for Mitigating Interference and Eavesdropping Attacks in Internet of Things Environments.一种用于减轻物联网环境中干扰和窃听攻击的物理层安全协作框架。
Sensors (Basel). 2024 Aug 10;24(16):5171. doi: 10.3390/s24165171.
3
A secure remote user authentication scheme for 6LoWPAN-based Internet of Things.基于 6LoWPAN 的物联网的安全远程用户认证方案。
PLoS One. 2021 Nov 8;16(11):e0258279. doi: 10.1371/journal.pone.0258279. eCollection 2021.
4
An IoT-Based Anonymous Function for Security and Privacy in Healthcare Sensor Networks.基于物联网的医疗传感器网络安全和隐私匿名函数
Sensors (Basel). 2019 Jul 17;19(14):3146. doi: 10.3390/s19143146.
5
Resistance of IoT Sensors against DDoS Attack in Smart Home Environment.物联网传感器在智能家居环境中对 DDoS 攻击的抵抗能力。
Sensors (Basel). 2020 Sep 16;20(18):5298. doi: 10.3390/s20185298.
6
Securing Infrared Communication in Nuclear Power Plants: Advanced Encryption for Infrared Sensor Networks.保障核电站中的红外通信:红外传感器网络的高级加密技术
Sensors (Basel). 2024 Mar 23;24(7):2054. doi: 10.3390/s24072054.
7
A secure remote health monitoring model for early disease diagnosis in cloud-based IoT environment.一种用于基于云的物联网环境中早期疾病诊断的安全远程健康监测模型。
Pers Ubiquitous Comput. 2023;27(3):697-713. doi: 10.1007/s00779-020-01475-3. Epub 2020 Nov 16.
8
A Framework for Off-Line Operation of Smart and Traditional Devices of IoT Services.物联网服务的智能和传统设备离线操作框架。
Sensors (Basel). 2020 Oct 23;20(21):6012. doi: 10.3390/s20216012.
9
IoT Privacy Risks Revealed.物联网隐私风险暴露。
Entropy (Basel). 2024 Jun 29;26(7):561. doi: 10.3390/e26070561.
10
Secure transmission for IoT wireless energy-carrying communication systems.物联网无线能量传输通信系统的安全传输。
PLoS One. 2023 Aug 3;18(8):e0289251. doi: 10.1371/journal.pone.0289251. eCollection 2023.

引用本文的文献

1
Securing Infrared Communication in Nuclear Power Plants: Advanced Encryption for Infrared Sensor Networks.保障核电站中的红外通信:红外传感器网络的高级加密技术
Sensors (Basel). 2024 Mar 23;24(7):2054. doi: 10.3390/s24072054.
2
A Critical Cybersecurity Analysis and Future Research Directions for the Internet of Things: A Comprehensive Review.物联网的关键网络安全分析与未来研究方向:全面综述。
Sensors (Basel). 2023 Apr 19;23(8):4117. doi: 10.3390/s23084117.

本文引用的文献

1
Towards Secure and Privacy-Preserving IoT Enabled Smart Home: Architecture and Experimental Study.面向安全和隐私保护的物联网智能家居:体系结构和实验研究。
Sensors (Basel). 2020 Oct 28;20(21):6131. doi: 10.3390/s20216131.
2
Ultra-high-capacity wireless communication by means of steered narrow optical beams.通过可控窄光束实现的超高容量无线通信。
Philos Trans A Math Phys Eng Sci. 2020 Apr 17;378(2169):20190192. doi: 10.1098/rsta.2019.0192. Epub 2020 Mar 2.