Secure your Home IoT Devices with the CryptoCrochet-Key

Anuradha Reddy
11 min readJul 8, 2021

--

Are you frustrated by complicated home security solutions requiring all manner of smart IoT devices with big-brother-y fingerprint/facial recognition tech, when all you want is a simple key to secure your home?

In a brave new world of quantum encryption, cryptocurrencies and NFT transactions, the concept of a ‘key’ is evermore abstracted by mathematical calculations when compared to the flat metal items we store in our pockets and purses. While digitally encrypted keys can make transactions relatively secure—like receiving an email, ordering a pizza, or dis/arming your home, they are still cryptic devices for those of us who are not already familiar with the technology nor supported by a civic hacker community. Is it possible to make your own physical key that is unique enough to avoid forgery while being recognisable to a local computer for making safe transactions? Thanks to a handy textile yarn called ‘crypto’ and some inspirational reading on programmable yarn, I was able to conceive the idea of physically encrypting a key using crochet and then teaching a computer to recognize the crocheted key using Machine Learning (Teachable Machine). This project was covered by Hackster.io when I first announced it and I promised to document a tutorial of sorts, so here it is :)

The first image shows a hacker news website featuring my CryptoCrochet-Key project. The article states “Anuradha Reddy’s CryptoCrochet-Key Gives You a Unique, Huggable Security Token for Home IoT.” The second image on the top right is the software application called ‘Teachable Machine’ where I’m training the Machine to learn how my crochet key looks using my computer webcam. The third image on the bottom right is a picture of my hand with the key testing on a Raspberry Pi computer.

CryptoCrochet-Key is meant as part ‘hack’ and part ‘pedagogical device’ that seeks to defamiliarize computational practices (learning code) from an intersectional feminist lens. It is meant to be inclusive and empowering for those who are skilled in other ways than traditional programmers and to show how their skills can contribute to a critical discussion of data-driven technologies —i.e. by putting the tech to radically different uses.

Crochet/knitting, as a handicraft practice, has strong associations with feminine, domestic hobbies and leisure. Although anyone who has engaged in the practice knows that it is, in fact, an intellectually demanding activity, one that takes advantage of the mathematical and mechanical properties of yarn and knitted fabric — anticipating how the material behaves with every stitch. Dr. Elisabetta Matsumoto, a physicist, has even argued that “yarn is programmable” and “knitting is coding” in her New York Times interview — a pedagogy that goes beyond coding binaries (ones and zeroes). Additionally, crocheting is an act of distributed cognition — a complex choreography between reading coded patterns and making corresponding hand movements with more than a single apparatus, sometimes in a social setting if one can afford it. Like other crafts, crochet does not separate the mind’s intellect from that of the body(ies). This argument is central to feminist, queer, and disability theories and a critique against positivist data-driven paradigms that strive to model reality from disembodied datasets. The act of crochet/knitting is also a labour of love, joy, and gift-giving — a kind of pushback and resistance to agile and extractive data-driven technology practices. If crochet practitioners have a seat at the table with software developers and data science practitioners, what might they do (or say)? CryptoCrochet-Key is one possible answer.

I will begin this 3-part tutorial by introducing CryptoCrochet-Key with instructions for making the key and then move to the Machine Learning part of the project. In the final part, I will show how you can run the CryptoCrochet-Key Machine Learning model on a Raspberry Pi 4. This third part is tricky and technical (even for me), so I will list step-wise instructions that can help ease the process!

Part 1: The Crochet Key

The word ‘crypto’ in CryptoCrochet has little to do with cryptography. Rather, the name is borrowed from a yarn called ‘crypto 8 ply’ manufactured by the Panda yarn company (AusYarnCo). This yarn is multicoloured/variegated, which lends itself to joyfully crafting objects that are “uniquely unique”. With each multicoloured stitch, it becomes possible to encrypt a discrete code/pattern in the shape of an object (in our case, a key) that only you have access to, and something only you can teach your computer to recognize. If you lose the key, you can make a new one and teach your computer to recognize the new key and delete data for the old one.

What I really enjoy about the key’s making process with multicoloured yarn is my loss of control over the colours, something one can liken to not being fully in control of how water travels when painting in watercolour. Later we will see how even the Machine Learning model has trouble making colour distinctions, something that we can use to our advantage to deliberately toy with the model.

Making the Key

Here’s what you will need to make the crocheted key. The first step is purchasing variegated/multicoloured yarn from your local yarn shop (fun!) and a crochet hook to go with it (the recommended size of the hook should be visible on the yarn packaging). I usually recommend a cotton yarn with a hook size of 3.5-4mm. You will also need some cotton wool for stuffing, stitch markers (or hairpins) for marking rounds and a tapestry needle with a wide eye to weave in loose yarn.

Before starting to crochet, it is useful to know some standard crochet notations that will appear in this tutorial. We will use only basic crochet stitches like the chain stitch (denoted by ‘ch’), the slip stitch (‘sl st’), and the single crochet stitch (‘sc’), which makes this a simple starter project. If you would like to learn the full range of crochet stitches, I can’t recommend CraftyMinx’s crochet school enough. If you are already familiar with the techniques, then the next section should be a breeze. Remember that the key is made in separate parts — the top doughnut ring, the long leg and two short legs. Let’s begin.

Tip: If you’d like to slip away from the computer screen for this crochet part of the tutorial, I created a PDF pattern that you can print and take with you. When you return, you can jump directly to Part 2.

The Doughnut

Alt text pattern for the doughnut: Row 1 — Chain 13, slip stitch to the first chain to form a circle (continued)
Row 2–1sc x 13; Row 3–2sc x 13; Row 4–2sc, 1sc x 13. Cut and weave in yarn (continued)
Row 5 — (back to Row 1) 1sc x 13; Row 6–2sc x 13; Row 7–2sc, 1sc x 13.

The Long leg and Two Short Legs

Make a second short leg and place it next to the first with a slight gap between them (to resemble a key). Ta-da!

Part 2: Teaching the Machine to Recognize Your Key

Once you’ve made your key, it's time to teach your computer to recognize it. In technical terms, this entails a complex process of combining the Transfer Learning technique (unsupervised Machine Learning — Neural Nets) with an Object Detection model (a pretrained Machine Learning model) and Computer Vision (CV) that uses a camera to ‘see’ the object and learn what it looks like. Executing this feat would ideally require a prior understanding of data science and analytics, but luckily for us, there is readily available software that lets us train Machine Learning models without prerequisite programming skills or data science knowledge. We will use one such browser-based software program called ‘Teachable Machine’ for this part of the tutorial.

Teachable Machine (TM) is a software to train your computer to recognize unique sounds, images, and body poses, allowing you to personalize your interactions with the computer. For example, with TM we can capture a large number of images of the crochet key via the computer’s webcam — from different angles and under different light conditions — and use those images as training data for the model. Once trained, the computer can predict with some degree of confidence whether what it sees is your key or some other object.

This is easy to do. We start an ‘Image Project’ and create classes for the kinds of objects we want or do not want the machine or computer to recognize.

Screenshot of the interface of Teachable Machine’s Image Project (https://teachablemachine.withgoogle.com/train/image)

For example, I made three keys, each with their unique variegated patterns. I wanted my computer to be able to recognize them individually. I named the keys ‘Candy,’ ‘Blossom’ and ‘Sunny’ (for my own visual recognition sake) and created separate classes for each of them.

For each key’s class, I used the ‘webcam’ option to feed as many images as possible for that key. I also created a fourth class called ‘Empty’ because I also trained my computer on what it sees when there is no key in view.

Once data is fed, the next step is to ‘train the model’. This takes some time depending on the number of images, so it is recommended not to switch browser tabs while the training is ongoing. The result of the training can be viewed in the preview window to the right, which also lets you test your trained model.

When I presented the reverse side of Candy to the camera (image below), the model was only 78% confident that it was seeing Candy and 22% confident it was seeing Blossom. This confusion occurs because both Candy and Blossom share similar visual features from their source material but are still different enough to be recognized on their own. We can take advantage of this model uncertainty by creating several look-alike objects that are memorable to us (because we make them) but not easily distinguishable to the machine. This is the opposite of the “10000 bowls of plain oatmeal” problem found in procedural generation algorithms, where a machine can generate 10000 bowls of oatmeal with each oat in a different size and orientation. While every oat is mathematically unique to the machine, the human cannot distinguish them nor appreciate their uniqueness. The crochet-key flips this problem around by queering the objects and the training data. Using variegated yarn in this way can help to play within the boundaries of the object detection machine learning models.

What is also attractive about TM is that the training happens locally in your browser and not elsewhere on the ‘cloud’ network, which means it is possible to download and run the TM model offline, thus allowing you to secure your project even further. This is possible by exporting your trained model using the TensorFlow framework — an open-source framework that supports machine learning on edge devices (e.g. on a browser window, on a tiny computer such as Raspberry Pi, or even a microcontroller such as Arduino Nano BLE Sense). For the remainder of the tutorial, I will demonstrate how you can create an offline secure application of the cryptocrochet-key TM model on a smaller computer i.e. the Raspberry Pi 4 using TensorFlow.

Part 3: CryptoCrochet-Key on a Raspberry Pi 4 with TensorFlow

We have come a long way! But truth be told, we still have some way to go and this is my least favourite part of the tutorial because it is the most technical and the part I feel least confident about. However, it is a crucial section as it adds another layer of security to the project.

You will need a Raspberry Pi 4 to go on from here. Sadly, the previous versions of RPi do not have sufficient processing power to run TensorFlow on them. Additionally, you will need a Raspberry Pi Camera Board v2 and a display board so you can see what the RPi 4 is seeing and recognizing. For the display, I used a PiTFT 2.8" Resistive Touchscreen board that I already had at home, although Adafruit recommends an all-in-one board called BrainCraft HAT that is tailored especially for Machine Learning with RPi 4. I know this is a lot of expensive gadgetry to ask of a beginner or amateur maker, so if you can access a maker/hackerspace in your local area that allows you to borrow or rent this equipment, I would recommend that instead. There’s also a learning curve to this part of the tutorial but I think pushing through it can help to overcome the fears that some of us hold for typing terminal commands to install libraries and other software dependencies. In other words, if you are new to hardware making/hacking, consider this a learning experience than an implementation.

I followed this Adafruit tutorial (by Andrew Reusch) to help me run the CryptoCrochet-Key TM model on Raspberry Pi 4. The tutorial is generally comprehensive, especially the TM part. However, I realised that there is actually a LOT of software setup and installations to be made for the RPi 4. I found help for this in another tutorial, but to save time, I will list out the steps I followed with links to each of them.

Step 1: Initial setup on RPi 4

Step 2: Display setup for both BrainCraft and Resistive Touchscreen

Step 3: Camera setup and test

Step 4: Install TensorFlow (yes, the title says TensorFlow ‘Lite’ but it actually installs TensorFlow)

Step 5: Visit TM and create classes (you already know this :))

Step 6: Capturing images via RPi’s camera

Step 7: Train model

Step 8: Export TensorFlow model from TM and transfer onto the RPi 4

Following these steps may require some patience and gut-feeling, especially if you are a newbie, like me, to terminal commands. But I got it working eventually! I even managed to play with the model’s uncertainty e.g. the GIF image above shows the model’s inability to distinguish between Candy and Sunny. In the end, I never deployed this project as a home security system because part of the fun was just seeing if I could and for it to be a learning experience.

What I hope you take away from this tutorial is (1) some inspiration for thinking of other non-traditional pedagogies for learning ‘how to code,’ (2) the empowerment to experiment with technologies or methods from industry (e.g. Machine Learning) using everyday materials — layered, thick, colourful, and patterned (like yarn), and (3) to re-deploy them for ends that were never intended by their creators through feminist, queering practices. The ‘CryptoCrochet-Key’ is just one of many adversarial things you can make with variegated yarns to tactically encounter smart surveillance and computer vision systems. Going forward, I can imagine exploring an entirely new genre of security authentication via knitted fashions (sweaters, suits) and wearables. Just need the time, energy and motivation!

Licensing information

The CryptoCrochet-Key is certified open hardware.

--

--