物联网背景下的侧通道时间泄漏分析

N. A. G. Junior, Andressa Vergutz, R. Macedo, Michele Nogueira
{"title":"物联网背景下的侧通道时间泄漏分析","authors":"N. A. G. Junior, Andressa Vergutz, R. Macedo, Michele Nogueira","doi":"10.5753/wgrs.2019.7690","DOIUrl":null,"url":null,"abstract":"The Internet of Things (IoT) emerged because of the technologicalevolution of wireless sensor networks, which enabled these sensors to integrate with common objects. These objects are equipped with sensors and actuatorscollect data from users and the environment, process them, and transform theminto useful information. By allowing the transmission of restricted / personaldata, communication traffic between devices becomes an interesting target forattackers who either access or manipulate them. However, even with cryptographic data, side-channel attacks exploit the characteristics of devices forthe purpose of acquiring information that may compromise the security of thenetwork structure. This work presents a way of characterizing the identical IoT dispositives by only exploring the time information. It carried the activitiesout such as structuring an experimental scenario, collecting traffic, extractingstatistical characteristics and finally identifying the dispositives. The results show we can identify even identical devices with up to 100% of accuracy.","PeriodicalId":353889,"journal":{"name":"Anais do Workshop de Gerência e Operação de Redes e Serviços","volume":"135 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Análise de Vazamentos Temporais Side-Channel no Contexto da Internet das Coisas\",\"authors\":\"N. A. G. Junior, Andressa Vergutz, R. Macedo, Michele Nogueira\",\"doi\":\"10.5753/wgrs.2019.7690\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The Internet of Things (IoT) emerged because of the technologicalevolution of wireless sensor networks, which enabled these sensors to integrate with common objects. These objects are equipped with sensors and actuatorscollect data from users and the environment, process them, and transform theminto useful information. By allowing the transmission of restricted / personaldata, communication traffic between devices becomes an interesting target forattackers who either access or manipulate them. However, even with cryptographic data, side-channel attacks exploit the characteristics of devices forthe purpose of acquiring information that may compromise the security of thenetwork structure. This work presents a way of characterizing the identical IoT dispositives by only exploring the time information. It carried the activitiesout such as structuring an experimental scenario, collecting traffic, extractingstatistical characteristics and finally identifying the dispositives. The results show we can identify even identical devices with up to 100% of accuracy.\",\"PeriodicalId\":353889,\"journal\":{\"name\":\"Anais do Workshop de Gerência e Operação de Redes e Serviços\",\"volume\":\"135 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-09-23\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Anais do Workshop de Gerência e Operação de Redes e Serviços\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.5753/wgrs.2019.7690\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Anais do Workshop de Gerência e Operação de Redes e Serviços","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.5753/wgrs.2019.7690","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

摘要

物联网(IoT)的出现是由于无线传感器网络的技术发展,使这些传感器能够与普通物体集成。这些物体配备了传感器和执行器,从用户和环境中收集数据,对其进行处理,并将其转换为有用的信息。通过允许传输受限/个人数据,设备之间的通信流量成为攻击者访问或操纵它们的有趣目标。然而,即使使用加密数据,侧信道攻击也会利用设备的特性来获取可能危及网络结构安全性的信息。这项工作提出了一种仅通过探索时间信息来表征相同物联网阴性的方法。它执行了诸如构建实验场景,收集流量,提取统计特征并最终确定负面影响等活动。结果表明,即使是相同的设备,我们也能以高达100%的准确率识别。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Análise de Vazamentos Temporais Side-Channel no Contexto da Internet das Coisas
The Internet of Things (IoT) emerged because of the technologicalevolution of wireless sensor networks, which enabled these sensors to integrate with common objects. These objects are equipped with sensors and actuatorscollect data from users and the environment, process them, and transform theminto useful information. By allowing the transmission of restricted / personaldata, communication traffic between devices becomes an interesting target forattackers who either access or manipulate them. However, even with cryptographic data, side-channel attacks exploit the characteristics of devices forthe purpose of acquiring information that may compromise the security of thenetwork structure. This work presents a way of characterizing the identical IoT dispositives by only exploring the time information. It carried the activitiesout such as structuring an experimental scenario, collecting traffic, extractingstatistical characteristics and finally identifying the dispositives. The results show we can identify even identical devices with up to 100% of accuracy.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信