Electromagnetic radiation-based IC device identification and verification using deep learning

被引:8
作者
Zhang, Hong-xin [1 ,2 ]
Liu, Jia [1 ]
Xu, Jun [3 ]
Zhang, Fan [4 ]
Cui, Xiao-tong [1 ]
Sun, Shao-fei [1 ]
机构
[1] Beijing Univ Posts & Telecommun, Coll Elect & Informat Engn, Beijing 100876, Peoples R China
[2] Beijing Univ Posts & Telecommun, Beijing Key Lab Work Safety Intelligent Monitorin, Beijing 100876, Peoples R China
[3] Beijing Inst Spacecraft Syst Engn, Beijing 100086, Peoples R China
[4] Zhejiang Univ, Coll Comp Sci & Technol, Hangzhou 310058, Zhejiang, Peoples R China
基金
中国国家自然科学基金; 北京市自然科学基金;
关键词
Radio frequency identification; Electromagnetic Radiation; Security; Deep learning; Res-net;
D O I
10.1186/s13638-020-01808-z
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The electromagnetic radiation of electronic equipment carries information and can cause information leakage, which poses a serious threat to the security system; especially the information leakage caused by encryption or other important equipment will have more serious consequences. In the past decade or so, the attack technology and means for the physical layer have developed rapidly. And system designers have no effective method for this situation to eliminate or defend against threats with an absolute level of security. In recent years, device identification has been developed and improved as a physical-level technology to improve the security of integrated circuit (IC)-based multifactor authentication systems. Device identification tasks (including device identification and verification) are accomplished by monitoring and exploiting the characteristics of the IC's unintentional electromagnetic radiation, without requiring any modification and process to hardware devices, thereby providing versatility and adapting existing hardware devices. Device identification based on deep residual networks and radio frequency is a technology applicable to the physical layer, which can improve the security of integrated circuit (IC)-based multifactor authentication systems. Device identification tasks (identification and verification) are accomplished by passively monitoring and utilizing the inherent properties of IC unintended RF transmissions without requiring any modifications to the analysis equipment. After the device performs a series of operations, the device is classified and identified using a deep residual neural network. The gradient descent method is used to adjust the network parameters, the batch training method is used to speed up the parameter tuning speed, the parameter regularization is used to improve the generalization, and finally, the Softmax classifier is used for classification. In the end, 28 chips of 4 models can be accurately identified into 4 categories, then the individual chips in each category can be identified, and finally 28 chips can be accurately identified, and the verification accuracy reached 100%. Therefore, the identification of radio frequency equipment based on deep residual network is very suitable as a countermeasure for implementing the device cloning technology and is expected to be related to various security issues.
引用
收藏
页数:23
相关论文
共 20 条
[1]   Provably secure and efficient PUF-based broadcast authentication schemes for smart grid applications [J].
Ameri, Mohammad Hassan ;
Delavar, Mahshid ;
Mohajeri, Javad .
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2019, 32 (08)
[2]  
[Anonymous], **NON-TRADITIONAL**
[3]  
[Anonymous], 2009, P 18 C USENIX SEC S
[4]  
Cobb William E., 2012, IEEE T INFORM FORENS, V7
[5]  
DeJean G, 2007, LECT NOTES COMPUT SC, V4727, P346
[6]  
Duan L, 2018, RESERCH BIOELECTRICA
[7]  
[胡蝶 Hu Die], 2020, [信息网络安全, Netinfo Security], P61
[8]   An introduction to biometric recognition [J].
Jain, AK ;
Ross, A ;
Prabhakar, S .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2004, 14 (01) :4-20
[9]   Deep Learning Based Multi-Channel Intelligent Attack Detection for Data Security [J].
Jiang, Feng ;
Fu, Yunsheng ;
Gupta, B. B. ;
Liang, Yongsheng ;
Rho, Seungmin ;
Lou, Fang ;
Meng, Fanzhi ;
Tian, Zhihong .
IEEE TRANSACTIONS ON SUSTAINABLE COMPUTING, 2020, 5 (02) :204-212
[10]  
Kim Y. C., 2010, P 2010 MIL COMM MILC, P682