Abstract
One possible device authentication method is based on device fingerprints, such as software- or hardware-based unique characteristics. In this paper, we propose a fingerprinting technique based on passive externally measured information, i.e., current consumption from the electrical network. The key insight is that small hardware discrepancies naturally exist even between same-electrical-circuit devices, making it feasible to identify slight variations in the consumed current under steady-state conditions. An experimental database of current consumption signals of two similar groups containing 20 same-model computer displays was collected. The resulting signals were classified using various state-of-the-art time-series classification (TSC) methods. We successfully identified 40 similar (same-model) electrical devices with about 94% precision, while most errors were concentrated in confusion between a small number of devices. A simplified empirical wavelet transform (EWT) paired with a linear discriminant analysis (LDA) classifier was shown to be the recommended classification method.
Subject
Electrical and Electronic Engineering,Biochemistry,Instrumentation,Atomic and Molecular Physics, and Optics,Analytical Chemistry
Reference43 articles.
1. Remote physical device fingerprinting;Kohno;IEEE Trans. Dependable Secur. Comput.,2005
2. Device Fingerprinting with Magnetic Induction Signals Radiated by CPU Modules;Ji;ACM Trans. Sens. Netw.,2022
3. Chen, Y., Jin, X., Sun, J., Zhang, R., and Zhang, Y. (2017, January 1–4). POWERFUL: Mobile app fingerprinting via power analysis. Proceedings of the IEEE INFOCOM 2017—IEEE Conference on Computer Communications, Atlanta, GA, USA.
4. Hernandez Jimenez, J., and Goseva-Popstojanova, K. (2019, January 28–30). Malware Detection Using Power Consumption and Network Traffic Data. Proceedings of the 2019 2nd International Conference on Data Intelligence and Security (ICDIS), South Padre Island, TX, USA.
5. Kocher, P., Jaffe, J., and Jun, B. (1999). Advances in Cryptology—CRYPTO’ 99, 19th Annual International Cryptology Conference, Springer. Lecture Notes in Computer Science.
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献