物联网背景下的侧通道时间泄漏分析

N. A. G. Junior, Andressa Vergutz, R. Macedo, Michele Nogueira
{"title":"物联网背景下的侧通道时间泄漏分析","authors":"N. A. G. Junior, Andressa Vergutz, R. Macedo, Michele Nogueira","doi":"10.5753/wgrs.2019.7690","DOIUrl":null,"url":null,"abstract":"The Internet of Things (IoT) emerged because of the technologicalevolution of wireless sensor networks, which enabled these sensors to integrate with common objects. These objects are equipped with sensors and actuatorscollect data from users and the environment, process them, and transform theminto useful information. By allowing the transmission of restricted / personaldata, communication traffic between devices becomes an interesting target forattackers who either access or manipulate them. However, even with cryptographic data, side-channel attacks exploit the characteristics of devices forthe purpose of acquiring information that may compromise the security of thenetwork structure. This work presents a way of characterizing the identical IoT dispositives by only exploring the time information. It carried the activitiesout such as structuring an experimental scenario, collecting traffic, extractingstatistical characteristics and finally identifying the dispositives. The results show we can identify even identical devices with up to 100% of accuracy.","PeriodicalId":353889,"journal":{"name":"Anais do Workshop de Gerência e Operação de Redes e Serviços","volume":"135 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Análise de Vazamentos Temporais Side-Channel no Contexto da Internet das Coisas\",\"authors\":\"N. A. G. Junior, Andressa Vergutz, R. Macedo, Michele Nogueira\",\"doi\":\"10.5753/wgrs.2019.7690\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The Internet of Things (IoT) emerged because of the technologicalevolution of wireless sensor networks, which enabled these sensors to integrate with common objects. These objects are equipped with sensors and actuatorscollect data from users and the environment, process them, and transform theminto useful information. By allowing the transmission of restricted / personaldata, communication traffic between devices becomes an interesting target forattackers who either access or manipulate them. However, even with cryptographic data, side-channel attacks exploit the characteristics of devices forthe purpose of acquiring information that may compromise the security of thenetwork structure. This work presents a way of characterizing the identical IoT dispositives by only exploring the time information. It carried the activitiesout such as structuring an experimental scenario, collecting traffic, extractingstatistical characteristics and finally identifying the dispositives. The results show we can identify even identical devices with up to 100% of accuracy.\",\"PeriodicalId\":353889,\"journal\":{\"name\":\"Anais do Workshop de Gerência e Operação de Redes e Serviços\",\"volume\":\"135 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-09-23\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Anais do Workshop de Gerência e Operação de Redes e Serviços\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.5753/wgrs.2019.7690\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Anais do Workshop de Gerência e Operação de Redes e Serviços","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.5753/wgrs.2019.7690","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

摘要

物联网(IoT)的出现是由于无线传感器网络的技术发展,使这些传感器能够与普通物体集成。这些物体配备了传感器和执行器,从用户和环境中收集数据,对其进行处理,并将其转换为有用的信息。通过允许传输受限/个人数据,设备之间的通信流量成为攻击者访问或操纵它们的有趣目标。然而,即使使用加密数据,侧信道攻击也会利用设备的特性来获取可能危及网络结构安全性的信息。这项工作提出了一种仅通过探索时间信息来表征相同物联网阴性的方法。它执行了诸如构建实验场景,收集流量,提取统计特征并最终确定负面影响等活动。结果表明,即使是相同的设备,我们也能以高达100%的准确率识别。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Análise de Vazamentos Temporais Side-Channel no Contexto da Internet das Coisas
The Internet of Things (IoT) emerged because of the technologicalevolution of wireless sensor networks, which enabled these sensors to integrate with common objects. These objects are equipped with sensors and actuatorscollect data from users and the environment, process them, and transform theminto useful information. By allowing the transmission of restricted / personaldata, communication traffic between devices becomes an interesting target forattackers who either access or manipulate them. However, even with cryptographic data, side-channel attacks exploit the characteristics of devices forthe purpose of acquiring information that may compromise the security of thenetwork structure. This work presents a way of characterizing the identical IoT dispositives by only exploring the time information. It carried the activitiesout such as structuring an experimental scenario, collecting traffic, extractingstatistical characteristics and finally identifying the dispositives. The results show we can identify even identical devices with up to 100% of accuracy.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Policy-Driven Network Traffic Rerouting Through Intent-Based Control Loops Uma Comparação entre os Sistemas de Detecção de Ameaças Distribuídas de Rede Baseado no Processamento de Dados em Fluxo e em Lotes Monitoramento e Disseminação Cooperativa de Eventos Emergenciais Apoiado por Agrupamentos de Veículos Gerenciamento da Infraestrutura de Comunicação baseado na Distribuição Gaussiana do Tempo de Contato entre Veículos e a Infraestrutura Seleção Online de Features em Streaming Baseada em Alpha-Investing Para Dados de Ataques DDoS
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1