Analysis of Compromising Video Disturbances through Power Line

被引:5
作者
Trip, Bogdan [1 ]
Butnariu, Vlad [1 ]
Vizitiu, Madalin [1 ]
Boitan, Alexandru [1 ]
Halunga, Simona [2 ]
机构
[1] Special Telecommun Serv, Bucharest 060044, Romania
[2] Univ Politehn Bucuresti, Telecommunt & Informat Technol Fac, Telecommun Dept, Bucharest 060042, Romania
关键词
TEMPEST; recovery; propagation; distance; compromising; video; protection; unintended; measurement; signal to noise ratio;
D O I
10.3390/s22010267
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
In this article, we present results on research performed in the TEMPEST domain, which studies the electromagnetic disturbances generated unintentionally by electronic equipment as well as the methods to protect the information processed by this equipment against these electromagnetic phenomena. The highest vulnerability of information leakage is attributed to the display video signal from the TEMPEST domain perspective. Examples of far-range propagation on a power line of this type of disturbance will be illustrated for the first time. Thus, the examples will highlight the possibility of recovering processed information at distances of 1, 10 and 50 m. There are published articles studying electromagnetic disturbances generated by electronic equipment propagating on power cables of such equipment but no studies on their long-distance propagation. Our research aims to raise awareness in the scientific community and the general public of the existence of such vulnerabilities that can compromise confidential or sensitive information that can make the difference between success or failure in the business sector, for example, or can harm personal privacy, which is also important for us all. Countermeasures to reduce or even eliminate these threats will also be presented based on the analysis of the signal-to noise-ratio recorded during our research.
引用
收藏
页数:22
相关论文
共 31 条
[1]  
[Anonymous], SHIELDED IN WALL CAB
[2]  
[Anonymous], 2019, ITURP525
[3]  
[Anonymous], SHIELDED POWER CABLE
[4]  
Asik U., 2020, P 2020 INT C INNOVAT, P1, DOI [10.1109/INISTA49547.2020.9194634, DOI 10.1109/INISTA49547.2020.9194634]
[5]   Method of Colors and Secure Fonts Used for Source Shaping of Valuable Emissions from Projector in Electromagnetic Eavesdropping Process [J].
Boitan, Alexandru ;
Kubiak, Ireneusz ;
Halunga, Simona ;
Przybysz, Artur ;
Stanczak, Andrzej .
SYMMETRY-BASEL, 2020, 12 (11) :1-19
[6]  
Council of the European Union, GEN SECR TEMPEST EMS
[7]  
European Committee for Electrotechnical Standardization (CENELEC), 2008, 55022 CENELEC EN EUR
[8]   Magnetic Field Analysis for Dimensional Resonance in Mn-Zn Ferrite Toroidal Core and Comparison With Permeability Measurement [J].
Furuya, Atsushi ;
Uehara, Yuji ;
Shimizu, Koichi ;
Fujisaki, Jun ;
Ataka, Tadashi ;
Tanaka, Tomohiro ;
Oshima, Hirotaka .
IEEE TRANSACTIONS ON MAGNETICS, 2017, 53 (11)
[9]  
General Secretariat of the Council of the European Union (GSC) EU Standard, 2013, 703 GSC IASG
[10]   Numerical modelling of magnetic characteristics of ferrite core taking account of both eddy current and displacement current [J].
Ghosh, Mohendro Kumar ;
Gao, Yanhui ;
Dozono, Hiroshi ;
Muramatsu, Kazuhiro ;
Guan, Weimin ;
Yuan, Jiaxin ;
Tian, Cuihua ;
Chen, Baichao .
HELIYON, 2019, 5 (08)