DOI QR코드

DOI QR Code

Trends in Device DNA Technology Trend for Sensor Devices

센서 기반의 디바이스 DNA 기술 동향

  • Published : 2020.02.01

Abstract

Just as it is possible to distinguish people by using physical features, such as fingerprints, irises, veins, and faces, and behavioral features, such as voice, gait, keyboard input pattern, and signatures, the an IoT device includes various features that cannot be replicated. For example, there are differences in the physical structure of the chip, differences in computation time of the devices or circuits, differences in residual data when the SDRAM is turned on and off, and minute differences in sensor sensing results. Because of these differences, Sensor data can be collected and analyzed, based on these differences, to identify features that can classify the sensors and define them as sensor-based device DNA technology. As Similar to the biometrics, such as human fingerprints and irises, can be authenticatedused for authentication, sensor-based device DNA can be used to authenticate sensors and generate cryptographic keys that can be used for security.

Keywords

References

  1. G. Suh and S. Devadas, "Physical unclonable functions for device authentication and secret key generation," In Proc. Annu. Design Autom. Conf., June 2007, pp. 9-14.
  2. 강유성 외 3인, 물리적 복제 방지 기능(PUF) 보안 요구사항 및 시험방법 국제표준화 동향," 정보보호학회지, 제28권 제4호, 2018. 8.
  3. D. Lim et al., "Extracting secret keys from integrated circuits," IEEE Trans. Very Large Scale Integr. (VLSI) Syst., vol. 13, no. 10, 2005, pp. 1200-1205. https://doi.org/10.1109/TVLSI.2005.859470
  4. A Maiti et al., "A large scale characterization of RO-PUF," In Proc. IEEE Int. Symp. Hardware-Oriented Security Trust, June 2010, pp. 94-99, June 2010.
  5. Z. Cherif et al., "An Easy-to-Design PUF based on a single oscillator: the Loop PUF," In Proc. Euromicro Conf. Digital Syst. Design, Sept. 2012.
  6. T. W. Kim, B. D. Choi, and D. K. Kim, "Zero bit error rate ID generation circuit using via formation probability in $0.18{\mu}m$ CMOS process," Electron. Lett., vol. 50, no. 12, 2014, pp. 876-877. https://doi.org/10.1049/el.2013.3474
  7. D. Holcomb, W. Burleson, and K. Fu, "Power-Up SRAM State as an Identifying Fingerprint and Source of True Random Numbers," IEEE Trans. Comput., vol. 58, no. 9, Sept. 2009, pp. 1198-1210. https://doi.org/10.1109/TC.2008.212
  8. W. Xiong et al., "Run-time Accessible DRAM PUFs in Commodity Devices," In Proc. Conf. Cryptographic Hardw. Embedded Syst., Santa Barbara, USA, Aug. 2016, pp. 432-453.
  9. A. Das, N. Boriso, and E. Chou, "Every Move You Make: Exploring Practical Issues in Smartphone Motion Sensor Fingerprinting and Countermeasures," Privacy Enhancing Technol. Symp., vol. 2018, no. 1, 2018, pp. 88-108.
  10. I. Amerini et al., "Smartphone Fingerprinting Combining Features of On-Board Sensors," IEEE Trnas. Inf. Forensics Security, vol. 12, no. 10, Oct. 2017.
  11. O. Willers et al., "MEMS-based Gyroscopes as Physical Unclonable Functions," in Proc. ACM SIGSAC Conf. Comput. Commun. Secur., Vienna, Austria, Oct. 2016, pp. 591-602.
  12. R. Jin et al., "MagPairing: Pairing Smartphones in Close Proximity Using Magnetometers," IEEE Trnas. Inf. Forensics Security, vol. 11, no. 6, June 2016.
  13. J. Lukas and J. Fridrich, "Digital Camera Identification From Sensor Pattern Noise," IEEE Trnas. Inf. Forensics Security, vol. 1, no. 2, June 2006.
  14. A. Lawgaly and F. Khelifi, "Sensor Pattern Noise Estimation Based on Improved Locally Adaptive DCT Filtering and Weighted Averaging for Source Camera Identification and Verification," IEEE Trnas. Inf. Forensics Security, vol. 12, no. 2, Feb. 2017.
  15. Y. Tomioka, Y. Ito, and H. Kitazawa, "Robust Digital Camera Identification Based on Pairwise Magnitude Relations of Clustered Sensor Pattern Noise," IEEE Trnas. Inf. Forensics Security, vol. 8, no. 12, Dec. 2013.
  16. 오태우 외, "센서 패턴 잡음을 이용한 디지털 상 획득 장치 판별," 정보처리학회논문지/소프트웨어 데이터 공학, 제4권 제12호, 2015. 12.
  17. 이상형 외, "모폴로지필터링기반 센서 패턴 노이즈를 이용한 디지털 동상 획득 장치 별 기술," 정보처리학회논문지/소프트웨어 데이터 공학, 제6권 제1호, 2017. 1.
  18. A. Lawgaly, "Digital camera identification using sensor pattern noise for forensics applications," [online] available at: http://nrl.northumbria.ac.uk/32314/
  19. L. J. G.Villalba et al., "A PRNU-based counter-forensic method to manipulate smartphone image source identification techniques," Future Generation Comput. Syst., vol. 76, 2017, pp. 418-427. https://doi.org/10.1016/j.future.2016.11.007
  20. Netherlands Forensic Institute. PRNU Decompare. 2013. [online source] available at: https://sourceforge.net/p/prnudecompare/wiki/Home/
  21. S. A. Anand et al., "Spearphone: A Speech Privacy Exploit via Accelerometer-Sensed Reverberations from Smartphone Loudspeakers-How using the smartphone in speakerphone mode erodes your privacy," IEEE Trnas. Inf. Forensics Security, vol. 12, no. 2, Feb. 2017.
  22. A. Das, N. Borisov, and M. Caesar, "Exploring Ways To Mitigate Sensor-Based Smartphone Fingerprinting", ArXiv 2015.