RF Fingerprinting: Hardware-Trustworthiness Enhancement in the Hardware Trojan Era: RF Fingerprinting-Based Countermeasures

被引:5
作者
Miguelez-Gomez, Noemi [1 ]
Rojas-Nastrucci, Eduardo A. [1 ]
机构
[1] Embry Riddle Aeronaut Univ, Dept Elect Engn & Comp Sci, Daytona Beach, FL 32114 USA
关键词
Radio frequency; Microwave integrated circuits; Wireless networks; Fingerprint recognition; Ubiquitous computing; Microwave theory and techniques; Communication system security; INFORMATION-FLOW TRACKING; PHYSICAL LAYER; SIDE-CHANNEL; AUTHENTICATION; DESIGN; NETWORKS; EMISSION; PROBE;
D O I
10.1109/MMM.2023.3303591
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Ensuring the security of wireless networks entails ensuring the authenticity, confidentiality, integrity, and availability of the data exchanged through them. In this data-dependent era, global communications systems have been experiencing rapid increases in the amount of data shared daily, thanks to the evolution of technologies that enable low-cost and ubiquitous wireless connectivity. In the last two decades, there has been a continuous increase in wireless traffic due to wireless technology advancements and a wide range of applications, and the increase in wireless network users [1], [2]. Although the total annual Internet traffic was a few exabytes of data fewer than 15 years ago, more than two hundred exabytes have been reached in the last two years. Moreover, by next year, the average Wi-Fi speed is predicted to be 92 Mb/s, up from 30 Mb/s in 2018 [3], [4]. This evolution has been driven by user demand, which includes higher data rates and broader coverage and bandwidth capabilities in wireless networks. Promising updates for current communication tools are in the making, but the boom in the amount of the data shared by them is making global communication systems a larger and easier target for security attacks [5], [6].
引用
收藏
页码:35 / 52
页数:18
相关论文
共 64 条
[1]   Near-Field Backscattering-Based Sensing for Hardware Trojan Detection [J].
Adibelli, Sinan ;
Juyal, Prateek ;
Nguyen, Luong N. ;
Prvulovic, Milos ;
Zajic, Alenka .
IEEE TRANSACTIONS ON ANTENNAS AND PROPAGATION, 2020, 68 (12) :8082-8090
[2]  
Ahmed M. M., 2019, Journal of Hardware and Systems Security, V3, P273
[3]   Radiated Electromagnetic Emission for Integrated Circuit Authentication [J].
Ahmed, Mosabbah Mushir ;
Hely, David ;
Barbot, Nicolas ;
Siragusa, Romain ;
Perret, Etienne ;
Bernier, Maxime ;
Garet, Fredric .
IEEE MICROWAVE AND WIRELESS COMPONENTS LETTERS, 2017, 27 (11) :1028-1030
[4]  
Al-Shawabka A, 2020, IEEE INFOCOM SER, P646, DOI [10.1109/INFOCOM41043.2020.9155259, 10.1109/infocom41043.2020.9155259]
[5]   Trusted Analog/Mixed-Signal/RF ICs: A Survey and a Perspective [J].
Antonopoulos, Angelos ;
Kapatsori, Christiana ;
Makris, Yiorgos .
IEEE DESIGN & TEST, 2017, 34 (06) :63-76
[6]  
Balasch J, 2015, IEEE INT SYMP ELEC, P246, DOI 10.1109/ISEMC.2015.7256167
[7]   On Reverse Engineering-Based Hardware Trojan Detection [J].
Bao, Chongxi ;
Forte, Domenic ;
Srivastava, Ankur .
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2016, 35 (01) :49-57
[8]   Temperature Tracking: Toward Robust Run-Time Detection of Hardware Trojans [J].
Bao, Chongxi ;
Forte, Domenic ;
Srivastava, Ankur .
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2015, 34 (10) :1577-1585
[9]   Hardware Trojan Attacks: Threat Analysis and Countermeasures [J].
Bhunia, Swarup ;
Hsiao, Michael S. ;
Banga, Mainak ;
Narasimhan, Seetharam .
PROCEEDINGS OF THE IEEE, 2014, 102 (08) :1229-1247
[10]  
Bhunia Swarup., 2018, Hardware Security: A Hands-on Learning Approach