MAGLeak: A Learning-Based Side-Channel Attack for Password Recognition With Multiple Sensors in IIoT Environment

被引:29
作者
Chen, Dajiang [1 ,2 ]
Zhao, Zihao [1 ]
Qin, Xue [3 ]
Luo, Yaohua [4 ,5 ]
Cao, Mingsheng [1 ]
Xu, Hua [6 ]
Liu, Anfeng [7 ]
机构
[1] UESTC, Network & Data Secur Key Lab Sichuan Prov, Chengdu 611731, Peoples R China
[2] Peng Cheng Lab, Shenzhen 518055, Peoples R China
[3] Univ Windsor, Dept Elect & Comp Engn, Windsor, ON N9B 3P4, Canada
[4] State Key Lab Geohazard Prevent & Geoenvironm Pro, Shenzhen 518055, Peoples R China
[5] Chengdu Univ Technol, Coll Informat Sci & Technol, Chengdu 610059, Peoples R China
[6] Yancheng Teachers Univ, Sch Phys & Elect Engn, Yancheng 224007, Peoples R China
[7] Cent South Univ, Sch Informat Sci & Engn, Changsha 410083, Peoples R China
关键词
Password; Sensors; Keyboards; Intelligent sensors; Side-channel attacks; Accelerometers; Training; Accelerometer; gyroscope; industrial Internet of Things (IIoT); magnetometer; password cracking; random forest; side-channel attack; INDUSTRIAL; AUTHENTICATION; COMMUNICATION; CHALLENGES; NETWORKS; SYSTEMS;
D O I
10.1109/TII.2020.3045161
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As an emerging technology, industrial Internet of Things (IIoT) connects massive sensors and actuators to empower industrial sectors being smart, autonomous, efficient, and safety. However, due the large number of build-in sensors of IIoT smart devices, the IIoT systems are vulnerable to side-channel attack. In this article, a novel side-channel-based passwords cracking system, namely MAGLeak, is proposed to recognize the victim's passwords by leveraging accelerometer, gyroscope, and magnetometer of IIoT touch-screen smart device. Specifically, an event-driven data collection method is proposed to ensure that the user's keystroke behavior can be reflected accurately by the obtained measurements of three sensors. Moreover, random forest algorithm is leveraged for the recognition module, followed by a data preprocessing process. Extensive experimental results demonstrate that MAGLeak achieves a high recognition accuracy under small training dataset, e.g., achieving recognition accuracy 98% of each single key for 2000 training samples.
引用
收藏
页码:467 / 476
页数:10
相关论文
共 32 条
[1]  
Abrishamchi MAN, 2017, IEEE IND ELEC, P8144, DOI 10.1109/IECON.2017.8217429
[2]   Context-Sensitive Access in Industrial Internet of Things (IIoT) Healthcare Applications [J].
Al-Turjman, Fadi ;
Alturjman, Sinem .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2018, 14 (06) :2736-2744
[3]   Keystroke Recognition Using WiFi Signals [J].
Ali, Kamran ;
Liu, Alex X. ;
Wang, Wei ;
Shahzad, Muhammad .
MOBICOM '15: PROCEEDINGS OF THE 21ST ANNUAL INTERNATIONAL CONFERENCE ON MOBILE COMPUTING AND NETWORKING, 2015, :90-102
[4]  
Cai L., 2011, P 6 USENIX WORKSH HO, P1
[5]   SDN-Enabled Multi-Attribute-Based Secure Communication for Smart Grid in IIoT Environment [J].
Chaudhary, Rajat ;
Aujla, Gagangeet Singh ;
Garg, Sahil ;
Kumar, Neeraj ;
Rodrigues, Joel J. P. C. .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2018, 14 (06) :2629-2640
[6]   SMOTE: Synthetic minority over-sampling technique [J].
Chawla, Nitesh V. ;
Bowyer, Kevin W. ;
Hall, Lawrence O. ;
Kegelmeyer, W. Philip .
2002, American Association for Artificial Intelligence (16)
[7]   Physical Layer based Message Authentication with Secure Channel Codes [J].
Chen, Dajiang ;
Zhang, Ning ;
Cheng, Nan ;
Zhang, Kuan ;
Qin, Zhiguang ;
Shen, Xuemin .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2020, 17 (05) :1079-1093
[8]   Automated Labeling and Learning for Physical Layer Authentication Against Clone Node and Sybil Attacks in Industrial Wireless Edge Networks [J].
Chen, Songlin ;
Pang, Zhibo ;
Wen, Hong ;
Yu, Kan ;
Zhang, Tengyue ;
Lu, Yueming .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2021, 17 (03) :2041-2051
[9]   IIoT Cybersecurity Risk Modeling for SCADA Systems [J].
Falco, Gregory ;
Caldera, Carlos ;
Shrobe, Howard .
IEEE INTERNET OF THINGS JOURNAL, 2018, 5 (06) :4486-4495
[10]   Increasing the Trustworthiness in the Industrial IoT Networks Through a Reliable Cyberattack Detection Model [J].
Hassan, Mohammad Mehedi ;
Gumaei, Abdu ;
Huda, Shamsul ;
Almogren, Ahmad .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2020, 16 (09) :6154-6162