Abstract

The electromagnetic radiation of electronic equipment carries information and can cause information leakage, which poses a serious threat to the security system; especially the information leakage caused by encryption or other important equipment will have more serious consequences. In the past decade or so, the attack technology and means for the physical layer have developed rapidly. And system designers have no effective method for this situation to eliminate or defend against threats with an absolute level of security. In recent years, device identification has been developed and improved as a physical-level technology to improve the security of integrated circuit (IC)-based multifactor authentication systems. Device identification tasks (including device identification and verification) are accomplished by monitoring and exploiting the characteristics of the IC’s unintentional electromagnetic radiation, without requiring any modification and process to hardware devices, thereby providing versatility and adapting existing hardware devices. Device identification based on deep residual networks and radio frequency is a technology applicable to the physical layer, which can improve the security of integrated circuit (IC)-based multifactor authentication systems. Device identification tasks (identification and verification) are accomplished by passively monitoring and utilizing the inherent properties of IC unintended RF transmissions without requiring any modifications to the analysis equipment. After the device performs a series of operations, the device is classified and identified using a deep residual neural network. The gradient descent method is used to adjust the network parameters, the batch training method is used to speed up the parameter tuning speed, the parameter regularization is used to improve the generalization, and finally, the Softmax classifier is used for classification. In the end, 28 chips of 4 models can be accurately identified into 4 categories, then the individual chips in each category can be identified, and finally 28 chips can be accurately identified, and the verification accuracy reached 100%. Therefore, the identification of radio frequency equipment based on deep residual network is very suitable as a countermeasure for implementing the device cloning technology and is expected to be related to various security issues.

Highlights

  • In recent years, the physical attack methods for security systems have developed rapidly, making it increasingly difficult for new countermeasures and security measures to keep up with the development [1]

  • 7.1 The result of training using the original signal In this study, the signal was amplified only when the signal was acquired, and no subsequent processing was performed on the signal

  • 100% recognition accuracy can be achieved under the original conditions without signal enhancement, and the results show that the device can achieve great performance without additional optimization

Read more

Summary

Introduction

The physical attack methods for security systems have developed rapidly, making it increasingly difficult for new countermeasures and security measures to keep up with the development [1]. Academic and commercial research organizations are dedicated to studying the physical security of encryption and other security devices. These works focused on the following directions over the past decade: side-channel analysis and failure analysis [3]. Given that many implementation attacks are well within the reach of even modestly funded and minimally equipped individuals, they should be given serious practical consideration when designing modern systems. Designed methods are (1) assuming that security tokens or other basic system components are affected by forgery, cloning or sensitive data extraction, and (2) taking appropriate solutions to mitigate the associated risks and treating them as an integrated, multi-layered part of the system security architecture

Methods
Results
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.