Skip to main content

2019 | OriginalPaper | Buchkapitel

Approach to Side Channel-Based Cybersecurity Monitoring for Autonomous Unmanned Objects

verfasst von : Viktor Semenov, Mikhail Sukhoparov, Ilya Lebedev

Erschienen in: Interactive Collaborative Robotics

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In this paper, problematic issues in ensuring the cybersecurity of autonomous unmanned objects were considered. Moreover, prerequisites that determine the need for external monitoring systems were identified. The type and statistical characteristics used for the analysis and classification of sound signals were also shown. The proposed approach to the analysis of the cybersecurity condition of an autonomous object is based on classification methods and allows the identification of the current status based on digitized acoustic information processing. An experiment aimed at obtaining statistical information on various types of unmanned object maneuvers with various arrangements of an audio recorder was conducted. The data obtained was processed using two-layer feed-forward neural networks with sigmoid hidden neurons. Hence, the problem of identifying the cybersecurity condition of autonomous unmanned objects on the basis of processing acoustic signal information obtained through side channels was solved. Digitized information from an acoustic sensor (microphone) located statically in the experiment area was classified more accurately than from the microphone located directly on the autonomous object. With a minimum time of statistical information accumulation using the proposed approach, it becomes possible to identify differences in maneuvers performed by the unmanned object and, consequently, the cybersecurity condition of the object with a probability close to 0.7. The proposed approach for processing signal information can be used as an additional independent element to determine the cybersecurity condition of autonomous objects of unmanned systems. This approach can be quickly adapted using various mathematical tools and machine learning methods to achieve a given quality probabilistic assessment.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Page, J., Zaslavsky, A., Indrawan, M.: Countering security vulnerabilities using a shared security buddy model schema in mobile agent communities. In: Proceedings of the First International Workshop on Safety and Security in Multi-Agent Systems (SASEMAS 2004), pp. 85–101 (2004) Page, J., Zaslavsky, A., Indrawan, M.: Countering security vulnerabilities using a shared security buddy model schema in mobile agent communities. In: Proceedings of the First International Workshop on Safety and Security in Multi-Agent Systems (SASEMAS 2004), pp. 85–101 (2004)
2.
Zurück zum Zitat Semenov, V., Lebedev, I., Sukhoparov, M.: Identification of the state of individual elements of cyber-physical systems based on external behavioral characteristics. Appl. Inform. 13(5/77), 72–83 (2018) Semenov, V., Lebedev, I., Sukhoparov, M.: Identification of the state of individual elements of cyber-physical systems based on external behavioral characteristics. Appl. Inform. 13(5/77), 72–83 (2018)
3.
Zurück zum Zitat Hayashi, Y., Homma, N., Watanabe, T., Price, W., Radasky, W.: Introduction to the special section on electromagnetic information security. Proc. IEEE Trans. Electromagn. Compat. 55(3), 539–546 (2013)CrossRef Hayashi, Y., Homma, N., Watanabe, T., Price, W., Radasky, W.: Introduction to the special section on electromagnetic information security. Proc. IEEE Trans. Electromagn. Compat. 55(3), 539–546 (2013)CrossRef
4.
Zurück zum Zitat Han, Y., Christoudis, I., Diamantaras, K., Zonouz, S., Petropulu, A.: Side-channel-based code-execution monitoring systems: a survey. IEEE Signal Process. Mag. 36(2), 22–35 (2019)CrossRef Han, Y., Christoudis, I., Diamantaras, K., Zonouz, S., Petropulu, A.: Side-channel-based code-execution monitoring systems: a survey. IEEE Signal Process. Mag. 36(2), 22–35 (2019)CrossRef
5.
Zurück zum Zitat de Souza Faria, G., Kim, H.: Differential audio analysis: a new side-channel attack on PIN pads. Int. J. Inf. Secur. 18(1), 73–84 (2019)CrossRef de Souza Faria, G., Kim, H.: Differential audio analysis: a new side-channel attack on PIN pads. Int. J. Inf. Secur. 18(1), 73–84 (2019)CrossRef
6.
Zurück zum Zitat Gupta, H., Sural, S., Atluri, V., Vaidya, J.: A side-channel attack on smartphones: deciphering key taps using built-in microphones. J. Comput. Secur. 26(2), 255–281 (2018)CrossRef Gupta, H., Sural, S., Atluri, V., Vaidya, J.: A side-channel attack on smartphones: deciphering key taps using built-in microphones. J. Comput. Secur. 26(2), 255–281 (2018)CrossRef
7.
Zurück zum Zitat Sukhoparov, M., Semenov, V., Lebedev, I.: Monitoring of cybersecurity elements of cyber-physical systems using artificial neural networks. Methods Tech. Means Ensuring Inf. Secur. 27, 59–60 (2018) Sukhoparov, M., Semenov, V., Lebedev, I.: Monitoring of cybersecurity elements of cyber-physical systems using artificial neural networks. Methods Tech. Means Ensuring Inf. Secur. 27, 59–60 (2018)
9.
Zurück zum Zitat Semenov, V., Sukhoparov, M., Lebedev, I.: An approach to classification of the information security state of elements of cyber-physical systems using side electromagnetic radiation. In: Galinina, O., Andreev, S., Balandin, S., Koucheryavy, Y. (eds.) NEW2AN/ruSMART 2018. LNCS, vol. 11118, pp. 289–298. Springer, Cham (2018). https://doi.org/10.1007/978-3-030-01168-0_27CrossRef Semenov, V., Sukhoparov, M., Lebedev, I.: An approach to classification of the information security state of elements of cyber-physical systems using side electromagnetic radiation. In: Galinina, O., Andreev, S., Balandin, S., Koucheryavy, Y. (eds.) NEW2AN/ruSMART 2018. LNCS, vol. 11118, pp. 289–298. Springer, Cham (2018). https://​doi.​org/​10.​1007/​978-3-030-01168-0_​27CrossRef
11.
Zurück zum Zitat Genkin, D., Shamir, A., Tromer, E.: Acoustic cryptanalysis. J. Cryptol. 30(2), 392–443 (2017)CrossRef Genkin, D., Shamir, A., Tromer, E.: Acoustic cryptanalysis. J. Cryptol. 30(2), 392–443 (2017)CrossRef
13.
Zurück zum Zitat Lebedev, I., et al.: The analysis of abnormal behavior of the system local segment on the basis of statistical data obtained from the network infrastructure monitoring. In: Galinina, O., Balandin, S., Koucheryavy, Y. (eds.) NEW2AN/ruSMART 2016. LNCS, vol. 9870, pp. 503–511. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-46301-8_42CrossRef Lebedev, I., et al.: The analysis of abnormal behavior of the system local segment on the basis of statistical data obtained from the network infrastructure monitoring. In: Galinina, O., Balandin, S., Koucheryavy, Y. (eds.) NEW2AN/ruSMART 2016. LNCS, vol. 9870, pp. 503–511. Springer, Cham (2016). https://​doi.​org/​10.​1007/​978-3-319-46301-8_​42CrossRef
14.
Zurück zum Zitat Marinenkov, E., Viksnin, I., Zhukova, Yu., Usova, M.: Analysis of information interaction security within group of unmanned aerial vehicles. Sci. Tech. J. Inf. Technol. Mech. Opt. 18(5), 817–825 (2018) Marinenkov, E., Viksnin, I., Zhukova, Yu., Usova, M.: Analysis of information interaction security within group of unmanned aerial vehicles. Sci. Tech. J. Inf. Technol. Mech. Opt. 18(5), 817–825 (2018)
15.
Zurück zum Zitat Semenov, V., Lebedev, I.: Analysis of the state of cybersecurity of transport systems objects. Regional Informatics (RI-2018). In: Proceedings of the XVI St. Petersburg International Conference “Regional Informatics (RI-2018)”, pp. 324–325 (2018) Semenov, V., Lebedev, I.: Analysis of the state of cybersecurity of transport systems objects. Regional Informatics (RI-2018). In: Proceedings of the XVI St. Petersburg International Conference “Regional Informatics (RI-2018)”, pp. 324–325 (2018)
16.
Zurück zum Zitat Sridhar, P., Sheikh-Bahaei, S., Xia, S., Jamshidi, Mo.: Multi agent simulation using discrete event and soft-computing methodologies. In: Proceedings of the IEEE International Conference on Systems, Man and Cybernetics, vol. 2, pp. 1711–1716 (2003) Sridhar, P., Sheikh-Bahaei, S., Xia, S., Jamshidi, Mo.: Multi agent simulation using discrete event and soft-computing methodologies. In: Proceedings of the IEEE International Conference on Systems, Man and Cybernetics, vol. 2, pp. 1711–1716 (2003)
18.
Zurück zum Zitat Han, Y., Etigowni, S., Liu, H., Zonouz, S., Petropulu, A.: Watch me, but don’t touch me! Contactless control flow monitoring via electromagnetic emanations. In: Proceedings of the ACM Conference on Computer and Communications Security, pp. 1095–1108 (2017) Han, Y., Etigowni, S., Liu, H., Zonouz, S., Petropulu, A.: Watch me, but don’t touch me! Contactless control flow monitoring via electromagnetic emanations. In: Proceedings of the ACM Conference on Computer and Communications Security, pp. 1095–1108 (2017)
Metadaten
Titel
Approach to Side Channel-Based Cybersecurity Monitoring for Autonomous Unmanned Objects
verfasst von
Viktor Semenov
Mikhail Sukhoparov
Ilya Lebedev
Copyright-Jahr
2019
DOI
https://doi.org/10.1007/978-3-030-26118-4_27