Electromagnetic adverse radiation monitoring system using the QIVICON platform

Authors

  • Анна Віталіївна Романова National Aviation University
  • Георгій Филимонович Конахович National Aviation University

DOI:

https://doi.org/10.18372/2410-7840.22.14659

Keywords:

electromagnetic interference, touch sensor, smart home, monitoring system, attack signal

Abstract

In this article it was explained how a harmful signal could be intruded into the sensor system remotely. The structure of the sensor, which was considered vulnerable to electromagnetic interference, has been presented. Demonstrated the way of how the microcontroller and other components of the sensor work. The exact explanation was given to determine exact ways how the proposed sensor works in the presence of an attack signal. Examples were given of how the attack detection system changes with respect to the type of physical quantity measured by the sensor. It was presented in detail how the proposed method of protection works and its safety was analyzed. Hereby shown how to keep a certain security guarantee. A new method of protection for attack detection has been proposed, which is based on the idea that when the sensor is turned off, the sensor output should be "quiet". If the attack signal is maliciously induced into the sensor system during the "quiet" period, the microcontroller can detect it. A detailed description of the method of detecting EMC (electromagnetic interference) is presented and the guarantee of their detection in the context of a strong model of an attacker is proved. Such approach for detecting common EMF signals can exist both in a microphone system and in a system of temperature sensors or other sensors. It was explained what Manchester coding is and was shown in the graph, how and why it was used in this work. It shows which parts and components of the sensor systems were vulnerable to attacks and explains how these components could have been protected in the near future. It has been proven that the detection mechanism presented in the paper is both effective and reliable. The proofs were based only on theoretical calculations; however, they include all possible deviations. The subject focus was concentrated on the attacks with powerful EMCs, in which an attacker manipulates the user's sensors to enter exactly the values he wants.

Author Biographies

Анна Віталіївна Романова, National Aviation University

National Aviation University graduate, Master in Telecommunications and Radio Engineering

Георгій Филимонович Конахович, National Aviation University

Doctor of Technical Sciences, Professor, Head of the Department of Telecommunication and Radio-Electronic Systems of the National Aviation University

References

QIVICON [Електронний ресурс]. Режим доступу: https://en.wikipedia.org/wiki/QIVICON.

Кодування і передача даних з допомогою адаптера [Електронний ресурс]. Режим доступу: https:// studopedia.su/3_27863_koduvannya-signaliv.html.

L. Atzori, A. Iera,G. Morabito, "The Internet of Things: A survey", Computer Networks, iss.15, pp. 87-96, 2010.

Д. Ляхов, А. Стрелкина, Д. Узун, "Анализ методов и средств оценивания и обеспечения кибербезо-пасности IoT системы", Открытые информационные и компьютерные интегрированные технологии, №80, С. 182-193, 2018.

Published

2020-03-31

Issue

Section

Articles