Secure Connection between Google Home and IoT Device

This article presents a more secure connection between the NodemCU and Blynk, using the AES algorithm. it is aimed to prevent a vulnerability in the connection of Google Home devices with IoT during the Blynk IoT connection phase. Although the Blynk application offers a personal key, the network information linked in the memory of the physical device is vulnerable. The data is placed in the software by encrypting beforehand, and the connection is provided by decrypt during the connection. This study contributes to the prevention of security weaknesses caused by keeping software data on NodemCU as Plain Text in physical memory.

Secure Connection between Google Home and IoT Device

This article presents a more secure connection between the NodemCU and Blynk, using the AES algorithm. it is aimed to prevent a vulnerability in the connection of Google Home devices with IoT during the Blynk IoT connection phase. Although the Blynk application offers a personal key, the network information linked in the memory of the physical device is vulnerable. The data is placed in the software by encrypting beforehand, and the connection is provided by decrypt during the connection. This study contributes to the prevention of security weaknesses caused by keeping software data on NodemCU as Plain Text in physical memory.

___

  • Cabuk, U. C., Aydın, Ö., & Dalkılıç, G. (2017). A random number generator for lightweight authentication protocols: xorshiftR+. Turkish Journal of Electrical Engineering & Computer Sciences, 25(6), 4818-4828.
  • Aydın, Ö., & Dalkılıç, G. (2018, July). A hybrid random number generator for lightweight cryptosystems: xorshiftLplus. The 3rd International Conference on Engineering Technology and Applied Sciences (ICETAS).
  • Aydın, Ö., & Kösemen, C. (2020). XorshiftUL+: A novel hybrid random number generator for internet of things and wireless sensor network applications. Pamukkale Üniversitesi Mühendislik Bilimleri Dergisi, 26(5), 953-958.
  • Lee JY, Lin WC, Huang YH. A lightweight authentication protocol for internet of things. In: 2014 InternationalSymposium on Next-Generation Electronics (ISNE); New York, USA; 2014. pp. 1-2.
  • Aydın, Ö., Dalkılıç, G., & Kösemen, C. (2020). A novel grouping proof authentication protocol for lightweight devices: GPAPXR+. Turkish Journal of Electrical Engineering & Computer Sciences, 28(5), 3036-3051.
  • Milijana Surbatovich, Jassim Aljuraidan,Lujo Bauer,Some Recipes Can Do More Than Spoil Your Appetite: Analyzing the Security and Privacy Risks of IFTTT Recipes” WWW '17: Proceedings of the 26th International Conference on World Wide WebApril 2017
  • OmarAlrawi,Chaz Lever,ManosAntonakakis,FabianMonrose,Security Evaluation of Home-Based IoT Deployments, 2019 IEEE Symposium on Security and Privacy, 19-23 May 2019
  • I. S. Jacobs and C. P. Bean, “Fine particles, thin films and exchange anisotropy,” in Magnetism, vol. III, G. T. Rado and H. Suhl, Eds. New York: Academic, 1963, pp. 271–350.
  • Bennet Praba1,Shivam Kumar,Ankur Saxena, Sourabh Patel “Securing Assistant Based Home Automation using AES Algorithm” Department of Computer Science and Engineering SRM Institute of Science and Technology, Chennai, India,2019
  • Ross Mcpherson James Irvine, “Using Smartphones to Enable Low-Cost Secure Consumer IoT Devices,” Department of Electronic and Electrical Engineering, Royal College Building, Glasgow G1 1XW, U.K.
  • Çepik, H., Aydın, Ö., Dalkılıç, G. (2020) Security Vulnerability Assessment of Google Home Connection with an Internet of Things Device. In:7th International Management Information Systems Conference, İzmir, Turkey (9-11 December 2020.
  • Kingpin, "Attacks on and Countermeasures for USB Hardware Token Devices,'' Proceedings of the Fifth Nordic Workshop on Secure IT Systems, 2000
  • Grand, Joe. "Practical secure hardware design for embedded systems." Proceedings of the 2004 Embedded Systems Conference, San Francisco, California. 2004.
  • Torroja, Yago, et al. "A serial port based debugging tool to improve learning with arduino." 2015 Conference on Design of Circuits and Integrated Systems (DCIS). IEEE, 2015.
  • Kumar, M. Anand, and S. Karthikeyan. "Investigating the efficiency of Blowfish and Rejindael (AES) algorithms." International Journal of Computer Network and Information Security 4.2 (2012): 22.
  • Utpala, Kuchi NSSSS, N. Suresh Kumar, K. Praneetha, D. Hema Sruthi, and K. Sai Avinash Varma. "Authenticated IoT Based Online Smart Parking System with Cloud." Pramana Research Journal 9, no. 4 (2019).