Electromagnetic adverse radiation monitoring system using the QIVICON platform
DOI:
https://doi.org/10.18372/2410-7840.22.14659Keywords:
electromagnetic interference, touch sensor, smart home, monitoring system, attack signalAbstract
In this article it was explained how a harmful signal could be intruded into the sensor system remotely. The structure of the sensor, which was considered vulnerable to electromagnetic interference, has been presented. Demonstrated the way of how the microcontroller and other components of the sensor work. The exact explanation was given to determine exact ways how the proposed sensor works in the presence of an attack signal. Examples were given of how the attack detection system changes with respect to the type of physical quantity measured by the sensor. It was presented in detail how the proposed method of protection works and its safety was analyzed. Hereby shown how to keep a certain security guarantee. A new method of protection for attack detection has been proposed, which is based on the idea that when the sensor is turned off, the sensor output should be "quiet". If the attack signal is maliciously induced into the sensor system during the "quiet" period, the microcontroller can detect it. A detailed description of the method of detecting EMC (electromagnetic interference) is presented and the guarantee of their detection in the context of a strong model of an attacker is proved. Such approach for detecting common EMF signals can exist both in a microphone system and in a system of temperature sensors or other sensors. It was explained what Manchester coding is and was shown in the graph, how and why it was used in this work. It shows which parts and components of the sensor systems were vulnerable to attacks and explains how these components could have been protected in the near future. It has been proven that the detection mechanism presented in the paper is both effective and reliable. The proofs were based only on theoretical calculations; however, they include all possible deviations. The subject focus was concentrated on the attacks with powerful EMCs, in which an attacker manipulates the user's sensors to enter exactly the values he wants.
References
QIVICON [Електронний ресурс]. Режим доступу: https://en.wikipedia.org/wiki/QIVICON.
Кодування і передача даних з допомогою адаптера [Електронний ресурс]. Режим доступу: https:// studopedia.su/3_27863_koduvannya-signaliv.html.
L. Atzori, A. Iera,G. Morabito, "The Internet of Things: A survey", Computer Networks, iss.15, pp. 87-96, 2010.
Д. Ляхов, А. Стрелкина, Д. Узун, "Анализ методов и средств оценивания и обеспечения кибербезо-пасности IoT системы", Открытые информационные и компьютерные интегрированные технологии, №80, С. 182-193, 2018.
Downloads
Published
Issue
Section
License
Authors who publish with this journal agree to the following terms:- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).