AUTHENTICATION OF PERSONAL COMPUTERS WITH UNSTABLE INTERNAL NOISE

Authors

  • Elena Nyemkova

DOI:

https://doi.org/10.47839/ijc.19.4.1990

Keywords:

cybersecurity, authentication template, personal computer, internal electrical noise, autocorrelation, stability of signs, form-factor

Abstract

The article is devoted to the study of the stability authentication signs of personal computers; possibility of authentication follows from their physical differences as complex electronic devices. This approach provides the ability to remotely automatic authentication in real time. The authentication template was calculated from the sequence of values of the auto-correlation function of the internal electrical noise. It was demonstrated that the noise instability of noise leads to the error in the computer authentication. In order to reduce the error's probability, it was proposed to use the form-factor of autocorrelation function histogram for automatic sorting of noise files. The character of the noise instability had allowed the use of several authentication templates for one computer with instable noise. Each template was designed for the separate stability area. The probability of false authentication was reduced by using two authentication templates for one computer with instable noise, it was 30%. The recommendations were made about determining the priority of access to confidential information for computer with instable noise.

References

W. Ebeling, Formation of Structures in Irreversible Processes: Introduction to Theory of Dissipative Structures, Computer Research Institute, Moscow, Izhevsk, 2004, 256 p., (in Russian).

G. Nicolis, W. I. Prigogine, Self-Organization in Nonequilibrium Systems, Wiley-Interscience, New York, 1977, 512 p.

A. Mehrotra, Simulation and Modelling Techniques for Noise in Radio Frequency Integrated Circuits. PhD thesis, University of California, Berkeley, 1999, 181 p.

L.M. Fink, Theory of the Transfer of Discrete Messages, second ed., Soviet Radio, Moscow, 1970, 728 p., (in Russian).

O.V. Rybalsky, V.I. Solovyov, V.V. Zhuravel, “The system of tools of examination of audio and videotape recording are in Ukraine,” Bulletin of Polotsk State University, Series C, Fundamental Sciences, issue 4, pp. 15-19, 2018. (in Russian).

C. Yang, A.P. Sample, EM-ID: Tag-less Identification of Electrical Devices via Electro-magnetic Emissions, 2016, [Online]. Available at: https://www.researchgate.net/publication/303885731_EM-ID_Tag-less_identification_of_electrical_devices_via_electromagnetic_emissions.

J. Svoboda, M. Schanfein, Apparatus, System, and Method for Sensor Authentication, United States, Patent Application Publication, Pub. No.: US 2015/0006115 A1, 2015, 15 p.

J. Hasse, T. Gloe, M. Beck, Forensic Identification of GSM Mobile Phones, 2013, [Online]. Available at: https://cryptome.org/2013/08/gsm-id.pdf

B. Baker, J. Sanders, M. Schanfein, J. Svoboda, J. West, Passive Noise Analysis Studies on Tampering Indication, 2015, [Online]. Available at: https://www.osti.gov/servlets/purl/1360678

N. Zhao, G. Dublon, N. Gillian, A. Dementyev, J. Paradiso, “EMI Spy: Harnessing electromagnetic interference for low-cost, rapid prototyping of proxemic interaction,” Proceedings of the 12th International Conference on Wearable and Implantable Body Sensor Networks (BSN), Cambridge, MA, USA, June 9-12, 2015, pp.1–6.

G. Baldini, R. Giuliani, and G. Steri, “Physical Layer Authentication and Identification of Wireless Devices Using the Synchrosqueezing Transform,” Applied Sciences, Vol. 8, Issue 11, pp.1–19, 2018.

G. Hua, G. Bi, V.L.L. Thing, “On practical issues of electric network frequency based audio forensics,” IEEE Access, Vol. 5, 2017, pp. 20640-20651.

T. Pham, W. Ma, D. Tran, D.S. Tran, D. Phung, “A study on the stability of EEG signals for user authentication,” Proceedings of the 7th International IEEE/EMBS Conference on Neural Engineering (NER), Montpellier, France, April 22-24, 2015, pp. 122-125.

J.N. Pato, L.I. Millett (Eds.), Biometric Recognition: Challenges and Opportunities, National Academies Press (US), Washington, 2010, 182 p.

B.P. Rusyn, Ya.Yu. Warecki, Biometric Authentication and Cryptographic Protection, Lviv, Kolo, 2007, 287 p. (in Ukrainian).

I.I. Gorban, “The phenomenon of statistical stability,” Technical Physics, Vol. 84, Issue 3, pp.22-30, 2014 (in Russian).

I.I. Gorban, Theory of Hyper-Random Phenomena: Physical and Mathematical Foundations, Naukova Dumka, Kiev, 2011, 320 p. (in Russian).

A.I. Orlov, “Distributions of real statistical date are not normal,” Scientific Journal of Kuban State Agrarian University, issue 117(03), pp. 1-20, 2016. (in Russian).

E. Nyemkova, Z. Shandra, “Method of measurement of the identification parameters of sound recorder devices,” Bulletin of the National University “Lviv Polytechnic”, series of Computer Systems and Networks, issue 821, pp. 94-99, 2015. (in Ukrainian).

O. Shmelyoff, Oscillometer 7.30 – Multichannel Real-Time Spectrum Analyzer, 2014, [Online]. Available at: http://soft-arhiv.com/load/47-1-0-95. (in Russian).

E. Nyemkova, Z. Shandra, A. Klos-Witkowska, L. Wieclaw, Network Electronic Devices Authentication by Internal Electrical Noise in: Kh. Saeed, W. Homenda (Eds.), Computer Information Systems and Industrial Management, CISIM 2018, Lecture Notes in Computer Science, vol. 11127, Springer, Cham, 2018, pp. 474-485.

Downloads

Published

2020-12-30

How to Cite

Nyemkova, E. (2020). AUTHENTICATION OF PERSONAL COMPUTERS WITH UNSTABLE INTERNAL NOISE. International Journal of Computing, 19(4), 569-574. https://doi.org/10.47839/ijc.19.4.1990

Issue

Section

Articles