Autenticação baseada em ondas eletromagnéticas

  • Ivo Carlson UFMG
  • Max Gonzaga UFMG
  • Leonardo Oliveira UFMG
  • Heitor Ramos UFMG

Abstract


The rising moment in the use of smart devices brings up concerns about the security of the information exchanged. Authentication methods allow us to verify the provenance of a message. A way of authenticating a message is using the fingerprint of the device. Like humans, smart devices presents differences between them, that comes from the impossibility of manufacture two identicals devices. Once this device is used to generate some kind of media, these differences can be seen on the result. Those features that come along with the generated media can be used to fingerprint the device. In this paper we used Arduinos, typical IoT devices, to generate a signal and a Software Defined Radio to listen to it. The signal was then studied looking for features that could be used to fingerprint each device and then, develop an authentication method between IoT devices and a server.

References

Das, A., Borisov, N., and Caesar, M. (2014). Do you hear what i hear?: Fingerprinting smart devices through embedded acoustic components. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, CCS '14, pages 441–452, New York, NY, USA. ACM.

Hajj-Ahmad, A., Garg, R., and Wu, M. (2015). Enf-based region-of-recording identication for media signals. IEEE Transactions on Information Forensics and Security, 10(6):1125–1136.

Sehatbakhsh, N., Hong, H., Lazar, B., Johnson-Smith, B., Yilmaz, O., Alam, M., Nazari, A., Zajic, A., and Prvulovic, M. (2018). Syndrome: Spectral analysis for anomaly detection on medical iot and embedded devices-experimental demonstration.

Yilmaz, B. B., Callan, R. L., Prvulovic, M., and Zajiíc, A. (2018). Capacity of the em covert/side-channel created by the execution of instructions in a processor. IEEE Transactions on Information Forensics and Security, 13(3):605–620.

Zajic, A. and Prvulov, M. (2014). Experimental demonstration of electromagnetic information leakage from modern processor-memory systems. IEEE Transactions on Electromagnetic Compatibility, 56(4):885–893.
Published
2019-09-02
CARLSON, Ivo; GONZAGA, Max; OLIVEIRA, Leonardo; RAMOS, Heitor. Autenticação baseada em ondas eletromagnéticas. In: WORKSHOP ON SCIENTIFIC INITIATION AND UNDERGRADUATE WORKS - BRAZILIAN SYMPOSIUM ON CYBERSECURITY (SBSEG), 19. , 2019, São Paulo. Anais [...]. Porto Alegre: Sociedade Brasileira de Computação, 2019 . p. 105-114. DOI: https://doi.org/10.5753/sbseg_estendido.2019.14012.

Most read articles by the same author(s)