AUTHENTICATION OF PERSONAL COMPUTERS WITH UNSTABLE INTERNAL NOISE
DOI:
https://doi.org/10.47839/ijc.19.4.1990Keywords:
cybersecurity, authentication template, personal computer, internal electrical noise, autocorrelation, stability of signs, form-factorAbstract
The article is devoted to the study of the stability authentication signs of personal computers; possibility of authentication follows from their physical differences as complex electronic devices. This approach provides the ability to remotely automatic authentication in real time. The authentication template was calculated from the sequence of values of the auto-correlation function of the internal electrical noise. It was demonstrated that the noise instability of noise leads to the error in the computer authentication. In order to reduce the error's probability, it was proposed to use the form-factor of autocorrelation function histogram for automatic sorting of noise files. The character of the noise instability had allowed the use of several authentication templates for one computer with instable noise. Each template was designed for the separate stability area. The probability of false authentication was reduced by using two authentication templates for one computer with instable noise, it was 30%. The recommendations were made about determining the priority of access to confidential information for computer with instable noise.
References
W. Ebeling, Formation of Structures in Irreversible Processes: Introduction to Theory of Dissipative Structures, Computer Research Institute, Moscow, Izhevsk, 2004, 256 p., (in Russian).
G. Nicolis, W. I. Prigogine, Self-Organization in Nonequilibrium Systems, Wiley-Interscience, New York, 1977, 512 p.
A. Mehrotra, Simulation and Modelling Techniques for Noise in Radio Frequency Integrated Circuits. PhD thesis, University of California, Berkeley, 1999, 181 p.
L.M. Fink, Theory of the Transfer of Discrete Messages, second ed., Soviet Radio, Moscow, 1970, 728 p., (in Russian).
O.V. Rybalsky, V.I. Solovyov, V.V. Zhuravel, “The system of tools of examination of audio and videotape recording are in Ukraine,” Bulletin of Polotsk State University, Series C, Fundamental Sciences, issue 4, pp. 15-19, 2018. (in Russian).
C. Yang, A.P. Sample, EM-ID: Tag-less Identification of Electrical Devices via Electro-magnetic Emissions, 2016, [Online]. Available at: https://www.researchgate.net/publication/303885731_EM-ID_Tag-less_identification_of_electrical_devices_via_electromagnetic_emissions.
J. Svoboda, M. Schanfein, Apparatus, System, and Method for Sensor Authentication, United States, Patent Application Publication, Pub. No.: US 2015/0006115 A1, 2015, 15 p.
J. Hasse, T. Gloe, M. Beck, Forensic Identification of GSM Mobile Phones, 2013, [Online]. Available at: https://cryptome.org/2013/08/gsm-id.pdf
B. Baker, J. Sanders, M. Schanfein, J. Svoboda, J. West, Passive Noise Analysis Studies on Tampering Indication, 2015, [Online]. Available at: https://www.osti.gov/servlets/purl/1360678
N. Zhao, G. Dublon, N. Gillian, A. Dementyev, J. Paradiso, “EMI Spy: Harnessing electromagnetic interference for low-cost, rapid prototyping of proxemic interaction,” Proceedings of the 12th International Conference on Wearable and Implantable Body Sensor Networks (BSN), Cambridge, MA, USA, June 9-12, 2015, pp.1–6.
G. Baldini, R. Giuliani, and G. Steri, “Physical Layer Authentication and Identification of Wireless Devices Using the Synchrosqueezing Transform,” Applied Sciences, Vol. 8, Issue 11, pp.1–19, 2018.
G. Hua, G. Bi, V.L.L. Thing, “On practical issues of electric network frequency based audio forensics,” IEEE Access, Vol. 5, 2017, pp. 20640-20651.
T. Pham, W. Ma, D. Tran, D.S. Tran, D. Phung, “A study on the stability of EEG signals for user authentication,” Proceedings of the 7th International IEEE/EMBS Conference on Neural Engineering (NER), Montpellier, France, April 22-24, 2015, pp. 122-125.
J.N. Pato, L.I. Millett (Eds.), Biometric Recognition: Challenges and Opportunities, National Academies Press (US), Washington, 2010, 182 p.
B.P. Rusyn, Ya.Yu. Warecki, Biometric Authentication and Cryptographic Protection, Lviv, Kolo, 2007, 287 p. (in Ukrainian).
I.I. Gorban, “The phenomenon of statistical stability,” Technical Physics, Vol. 84, Issue 3, pp.22-30, 2014 (in Russian).
I.I. Gorban, Theory of Hyper-Random Phenomena: Physical and Mathematical Foundations, Naukova Dumka, Kiev, 2011, 320 p. (in Russian).
A.I. Orlov, “Distributions of real statistical date are not normal,” Scientific Journal of Kuban State Agrarian University, issue 117(03), pp. 1-20, 2016. (in Russian).
E. Nyemkova, Z. Shandra, “Method of measurement of the identification parameters of sound recorder devices,” Bulletin of the National University “Lviv Polytechnic”, series of Computer Systems and Networks, issue 821, pp. 94-99, 2015. (in Ukrainian).
O. Shmelyoff, Oscillometer 7.30 – Multichannel Real-Time Spectrum Analyzer, 2014, [Online]. Available at: http://soft-arhiv.com/load/47-1-0-95. (in Russian).
E. Nyemkova, Z. Shandra, A. Klos-Witkowska, L. Wieclaw, Network Electronic Devices Authentication by Internal Electrical Noise in: Kh. Saeed, W. Homenda (Eds.), Computer Information Systems and Industrial Management, CISIM 2018, Lecture Notes in Computer Science, vol. 11127, Springer, Cham, 2018, pp. 474-485.
Downloads
Published
How to Cite
Issue
Section
License
International Journal of Computing is an open access journal. Authors who publish with this journal agree to the following terms:• Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
• Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
• Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.