Journal article Open Access
Shaveta Bhatia; Rishi Singh; Raas Khanna; Madhur Gupta; Vaishnavi Kaushik
IoT devices are everywhere, they are readily available to everyone around the world. These devices are predominately controlled via voice command. During my research I asked how we can prevent these devices from listening to us and are there any security risks associated with them. This led me to find articles on light commands where an intruder can point a laser at your hub and gain access to your IoT devices such as door locks and lights. We dive into the workings of a MEMs devices, which is included in all voice-controlled devices including your phone. We explore ways to attack these voice-controlled devices in order to gain access to them. Now ways of preventing these devices to listen to us we can project a frequency that our ears cannot hear but these devices can pick up thus interfering with their microphones and improving our privacy without being a hassle to us. The frequency, (40 kHz) we use to jam these microphones theoretically should not be able to interfere with these microphones, but they do because of this frequency shadow that occurs. This shadow frequency is very interesting because you can do various things other than just jamming microphones for example data communication up to 4kbps and even use this in order to prevent unauthorized recordings of live performances and movies at the theaters.This findings can be applied to various fields where privacy is a key factor.
|Data volume||6.8 MB|