Frequencies and Lights Affecting IoT Devices
Shaveta Bhatia1, Rishi Singh2, Raas Khanna3, Madhur Gupta4, Vaishnavi Kaushik;5

1Dr. Sheveta Bhatia*, Head, Department of Computer Applications, Manav Rachna International Institute of Research and Studies, Haryana, India.
2Rishi Singh, Student, Department of Computer Applications, Manav Rachna International Institute of Research and Studies, Haryana, India.
3Raas Khanna, Student, Department of Computer Applications, Manav Rachna International Institute of Research and Studies, Haryana, India.
4Madhur Gupta, Student, Department of Computer Applications, Manav Rachna International Institute of Research and Studies, Haryana, India.
5Vaishnavi Kaushik, Student, Department of Computer Applications, Manav Rachna International Institute of Research and Studies, Haryana, India. 

Manuscript received on June 08, 2020. | Revised Manuscript received on June 25, 2020. | Manuscript published on June 30, 2020. | PP: 1194-1196 | Volume-9 Issue-5, June 2020. | Retrieval Number: E1060069520/2020©BEIESP | DOI: 10.35940/ijeat.E1060.069520
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: : IoT devices are everywhere, they are readily available to everyone around the world. These devices are predominately controlled via voice command. During my research I asked how we can prevent these devices from listening to us and are there any security risks associated with them. This led me to find articles on light commands where an intruder can point a laser at your hub and gain access to your IoT devices such as door locks and lights. We dive into the workings of a MEMs devices, which is included in all voice-controlled devices including your phone. We explore ways to attack these voice-controlled devices in order to gain access to them. Now ways of preventing these devices to listen to us we can project a frequency that our ears cannot hear but these devices can pick up thus interfering with their microphones and improving our privacy without being a hassle to us. The frequency, (40 kHz) we use to jam these microphones theoretically should not be able to interfere with these microphones, but they do because of this frequency shadow that occurs. This shadow frequency is very interesting because you can do various things other than just jamming microphones for example data communication up to 4kbps and even use this in order to prevent unauthorized recordings of live performances and movies at the theaters.This findings can be applied to various fields where privacy is a key factor. 
Keywords: Alexa, communication, google home, inaudible frequencies, IoT devices, machine learning, MEMS devices, privacy, Siri, security in IoT, ultrasonic frequencies, voice to light modulation.