Journal article Open Access
Shaveta Bhatia; Rishi Singh; Raas Khanna; Madhur Gupta; Vaishnavi Kaushik
<?xml version='1.0' encoding='utf-8'?> <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:adms="http://www.w3.org/ns/adms#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:dct="http://purl.org/dc/terms/" xmlns:dctype="http://purl.org/dc/dcmitype/" xmlns:dcat="http://www.w3.org/ns/dcat#" xmlns:duv="http://www.w3.org/ns/duv#" xmlns:foaf="http://xmlns.com/foaf/0.1/" xmlns:frapo="http://purl.org/cerif/frapo/" xmlns:geo="http://www.w3.org/2003/01/geo/wgs84_pos#" xmlns:gsp="http://www.opengis.net/ont/geosparql#" xmlns:locn="http://www.w3.org/ns/locn#" xmlns:org="http://www.w3.org/ns/org#" xmlns:owl="http://www.w3.org/2002/07/owl#" xmlns:prov="http://www.w3.org/ns/prov#" xmlns:rdfs="http://www.w3.org/2000/01/rdf-schema#" xmlns:schema="http://schema.org/" xmlns:skos="http://www.w3.org/2004/02/skos/core#" xmlns:vcard="http://www.w3.org/2006/vcard/ns#" xmlns:wdrs="http://www.w3.org/2007/05/powder-s#"> <rdf:Description rdf:about="https://zenodo.org/record/5549884"> <dct:identifier rdf:datatype="http://www.w3.org/2001/XMLSchema#anyURI">https://zenodo.org/record/5549884</dct:identifier> <foaf:page rdf:resource="https://zenodo.org/record/5549884"/> <dct:creator> <rdf:Description> <rdf:type rdf:resource="http://xmlns.com/foaf/0.1/Agent"/> <foaf:name>Shaveta Bhatia</foaf:name> <org:memberOf> <foaf:Organization> <foaf:name>Head, Department of Computer Applications, Manav Rachna International Institute of Research and Studies, Haryana, India.</foaf:name> </foaf:Organization> </org:memberOf> </rdf:Description> </dct:creator> <dct:creator> <rdf:Description> <rdf:type rdf:resource="http://xmlns.com/foaf/0.1/Agent"/> <foaf:name>Rishi Singh</foaf:name> <org:memberOf> <foaf:Organization> <foaf:name>Student, Department of Computer Applications, Manav Rachna International Institute of Research and Studies, Haryana, India.</foaf:name> </foaf:Organization> </org:memberOf> </rdf:Description> </dct:creator> <dct:creator> <rdf:Description> <rdf:type rdf:resource="http://xmlns.com/foaf/0.1/Agent"/> <foaf:name>Raas Khanna</foaf:name> <org:memberOf> <foaf:Organization> <foaf:name>Student, Department of Computer Applications, Manav Rachna International Institute of Research and Studies, Haryana, India.</foaf:name> </foaf:Organization> </org:memberOf> </rdf:Description> </dct:creator> <dct:creator> <rdf:Description> <rdf:type rdf:resource="http://xmlns.com/foaf/0.1/Agent"/> <foaf:name>Madhur Gupta</foaf:name> <org:memberOf> <foaf:Organization> <foaf:name>Student, Department of Computer Applications, Manav Rachna International Institute of Research and Studies, Haryana, India.</foaf:name> </foaf:Organization> </org:memberOf> </rdf:Description> </dct:creator> <dct:creator> <rdf:Description> <rdf:type rdf:resource="http://xmlns.com/foaf/0.1/Agent"/> <foaf:name>Vaishnavi Kaushik</foaf:name> <org:memberOf> <foaf:Organization> <foaf:name>Student, Department of Computer Applications, Manav Rachna International Institute of Research and Studies, Haryana, India.</foaf:name> </foaf:Organization> </org:memberOf> </rdf:Description> </dct:creator> <dct:title>Frequencies and Lights Affecting IoT Devices</dct:title> <dct:publisher> <foaf:Agent> <foaf:name>Zenodo</foaf:name> </foaf:Agent> </dct:publisher> <dct:issued rdf:datatype="http://www.w3.org/2001/XMLSchema#gYear">2020</dct:issued> <dcat:keyword>Alexa, communication, google home, inaudible frequencies, IoT devices, machine learning, MEMS devices, privacy, Siri, security in IoT, ultrasonic frequencies, voice to light modulation.</dcat:keyword> <dct:subject> <skos:Concept> <skos:prefLabel>2249-8958</skos:prefLabel> <skos:inScheme> <skos:ConceptScheme> <dct:title>issn</dct:title> </skos:ConceptScheme> </skos:inScheme> </skos:Concept> </dct:subject> <dct:subject> <skos:Concept> <skos:prefLabel>E1060069520/2020©BEIESP</skos:prefLabel> <skos:inScheme> <skos:ConceptScheme> <dct:title>handle</dct:title> </skos:ConceptScheme> </skos:inScheme> </skos:Concept> </dct:subject> <schema:sponsor> <rdf:Description> <rdf:type rdf:resource="http://xmlns.com/foaf/0.1/Agent"/> <foaf:name>Blue Eyes Intelligence Engineering and Sciences Publication(BEIESP)</foaf:name> <org:memberOf> <foaf:Organization> <foaf:name>Publisher</foaf:name> </foaf:Organization> </org:memberOf> </rdf:Description> </schema:sponsor> <dct:issued rdf:datatype="http://www.w3.org/2001/XMLSchema#date">2020-06-30</dct:issued> <dct:language rdf:resource="http://publications.europa.eu/resource/authority/language/ENG"/> <owl:sameAs rdf:resource="https://zenodo.org/record/5549884"/> <adms:identifier> <adms:Identifier> <skos:notation rdf:datatype="http://www.w3.org/2001/XMLSchema#anyURI">https://zenodo.org/record/5549884</skos:notation> <adms:schemeAgency>url</adms:schemeAgency> </adms:Identifier> </adms:identifier> <dct:relation rdf:resource="http://issn.org/resource/ISSN/2249-8958"/> <owl:sameAs rdf:resource="https://doi.org/10.35940/ijeat.E1060.069520"/> <dct:description><p>IoT devices are everywhere, they are readily available to everyone around the world. These devices are predominately controlled via voice command. During my research I asked how we can prevent these devices from listening to us and are there any security risks associated with them. This led me to find articles on light commands where an intruder can point a laser at your hub and gain access to your IoT devices such as door locks and lights. We dive into the workings of a MEMs devices, which is included in all voice-controlled devices including your phone. We explore ways to attack these voice-controlled devices in order to gain access to them. Now ways of preventing these devices to listen to us we can project a frequency that our ears cannot hear but these devices can pick up thus interfering with their microphones and improving our privacy without being a hassle to us. The frequency, (40 kHz) we use to jam these microphones theoretically should not be able to interfere with these microphones, but they do because of this frequency shadow that occurs. This shadow frequency is very interesting because you can do various things other than just jamming microphones for example data communication up to 4kbps and even use this in order to prevent unauthorized recordings of live performances and movies at the theaters.This findings can be applied to various fields where privacy is a key factor.</p></dct:description> <dct:accessRights rdf:resource="http://publications.europa.eu/resource/authority/access-right/PUBLIC"/> <dct:accessRights> <dct:RightsStatement rdf:about="info:eu-repo/semantics/openAccess"> <rdfs:label>Open Access</rdfs:label> </dct:RightsStatement> </dct:accessRights> <dct:license rdf:resource="https://creativecommons.org/licenses/by/4.0/legalcode"/> <dcat:distribution> <dcat:Distribution> <dcat:accessURL rdf:resource="https://doi.org/10.35940/ijeat.E1060.069520"/> <dcat:byteSize>326137</dcat:byteSize> <dcat:downloadURL rdf:resource="https://zenodo.org/record/5549884/files/E1060069520.pdf"/> <dcat:mediaType>application/pdf</dcat:mediaType> </dcat:Distribution> </dcat:distribution> </rdf:Description> </rdf:RDF>
Views | 51 |
Downloads | 25 |
Data volume | 8.2 MB |
Unique views | 51 |
Unique downloads | 25 |