Autenticação de Sensores usando Eventos Físicos
Resumo
A autenticação de sensores é um desafio que necessita ser tratado de forma apropriada. Neste artigo é proposto o uso de eventos físicos para autenticação de sensores. A imprevisibilidade e unicidade dos sistemas físicos são exploradas para gerar identificadores de evento a partir de dados de sensoriamento. Sendo únicos e difíceis de se deduzir, identificadores de evento podem ser usados para reforçar a autenticação. Além disso, eles proveem evidências de co-alocação e simultaneidade da autenticação, evitando ataques do tipo relay e replay. A viabilidade dessa proposta é demonstrada em sistemas de instrumentação de testes de impacto veiculares, com resultados promissores.
Referências
Gafurov, D., Snekkenes, E., and Bours, P. (2007). Gait authentication and identification using wearable accelerometer sensor. 2007 IEEE Workshop on Automatic Identification Advanced Technologies - Proceedings, pages 220–225.
Hsieh, W.-B. and Leu, J.-S. (2011). Design of a time and location based One-Time Password authentication scheme. In Wireless Communications and Mobile Computing Conference IWCMC 2011 7th International, pages 201–206.
Insurance Institute for Highway Safety (2014). Moderate Overlap Frontal Cashworthiness Evaluation. Technical Report September.
Liu, J., Zhong, L.,Wickramasuriya, J., and Vasudevan, V. (2009). uWave: Accelerometer-based personalized gesture recognition and its applications. Pervasive and Mobile Computing, 5(6):657–675.
Mathur, S., Reznik, A., Ye, C., Mukherjee, R., Rahman, A., Shah, Y., Trappe, W., and Mandayam, N. (2010). Exploiting the physical layer for enhanced security. IEEE Wireless Communications, 17(5):63–70.
Mayrhofer, R. and Gellersen, H. (2007). Shake Well Before Use: Authentication Based on Accelerometer Data. In 5th International Conference, PERVASIVE 2007, pages 144–161.
Mitra, S., Wongpiromsarn, T., and Murray, R. M. (2013). Verifying Cyber-Physical Interactions in Safety-Critical Systems. IEEE Security & Privacy, 11(4):28–37.
National Highway Traffic Safety Administration (2012). Laboratory Test Procedure For New Car Assessment Program Frontal Impact Testing. Technical Report September.
National Highway Traffic Safety Administration (2015). NHTSA Vehicle Crash Test Database. http://www-nrd.nhtsa.dot.gov/database/veh/veh.htm. Accessed: 2015-05-05.
Priya, L. C. and Patil, S. D. (2014). A Survey on Sensor Authentication in Dynamic Wireless Sensor Networks. International Journal of Computer Science and Information Technology Research, 2(2):454–461.
Scannell, A., Varshavsky, A., Lamarca, A., and de Lara, E. (2009). Proximity-based authentication of mobile devices. International Journal of Security and Networks, 4(1/2):4–16.
Suh, G. E. and Devadas, S. (2007). Physical unclonable functions for device authentication and secret key generation. Proceedings - Design Automation Conference, pages 9–14.
Wu, F.-J., Chu, F.-I., and Tseng, Y.-C. (2011). Cyber-physical handshake. ACM SIGCOMM Computer Communication Review, 41(4):472.
Yampolskiy, R. V. and Govindaraju, V. (2008). Behavioural biometrics: a survey and classification. International Journal of Biometrics, 1(1):81–113.