[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Ahmed et al., 2017 - Google Patents

NoiSense: Detecting data integrity attacks on sensor measurements using hardware based fingerprints

Ahmed et al., 2017

View PDF
Document ID
5705797568998898670
Author
Ahmed C
Mathur A
Ochoa M
Publication year
Publication venue
arXiv preprint arXiv:1712.01598

External Links

Snippet

In recent years fingerprinting of various physical and logical devices has been proposed with the goal of uniquely identifying users or devices of mainstream IT systems such as PCs, Laptops and smart phones. On the other hand, the application of such techniques in Cyber …
Continue reading at arxiv.org (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/03Arrangements for converting the position or the displacement of a member into a coded form
    • G06F3/041Digitisers, e.g. for touch screens or touch pads, characterized by the transducing means
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/03Arrangements for converting the position or the displacement of a member into a coded form
    • G06F3/033Pointing devices displaced or positioned by the user, e.g. mice, trackballs, pens or joysticks; Accessories therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/00006Acquiring or recognising fingerprints or palmprints
    • G06K9/00013Image acquisition

Similar Documents

Publication Publication Date Title
Liu et al. Machine learning for the detection and identification of Internet of Things devices: A survey
US11809552B2 (en) Systems, methods, and apparatuses for intrusion detection and analytics using power characteristics such as side-channel information collection
Ahmed et al. Noise matters: Using sensor and process noise fingerprint to detect stealthy cyber attacks and authenticate sensors in cps
Ahmed et al. Noiseprint: Attack detection using sensor and process noise fingerprint in cyber physical systems
Ahmed et al. Noisense print: detecting data integrity attacks on sensor measurements using hardware-based fingerprints
Singh et al. Machine-learning-assisted security and privacy provisioning for edge computing: A survey
US11463472B2 (en) Unknown malicious program behavior detection using a graph neural network
Alguliyev et al. Cyber-physical systems and their security issues
Giraldo et al. Security and privacy in cyber-physical systems: A survey of surveys
Faisal et al. Securing advanced metering infrastructure using intrusion detection system with data stream mining
Muthanna et al. Towards SDN-enabled, intelligent intrusion detection system for internet of things (IoT)
Stefanidis et al. An HMM-based anomaly detection approach for SCADA systems
Srivastav et al. Novel intrusion detection system integrating layered framework with neural network
Otoum et al. Mitigating False Negative intruder decisions in WSN-based Smart Grid monitoring
Ahanger Defense scheme to protect IoT from cyber attacks using AI principles
Ahmed et al. NoiSense: Detecting data integrity attacks on sensor measurements using hardware based fingerprints
Ikrissi et al. A study of smart campus environment and its security attacks
Zhu et al. Iot equipment monitoring system based on c5. 0 decision tree and time-series analysis
Ahmed et al. Hardware identification via sensor fingerprinting in a cyber physical system
Singh et al. A review on cyber physical system attacks: Issues and challenges
Ahmed et al. Scanning the cycle: Timing-based authentication on PLCs
Kallitsis et al. Adaptive statistical detection of false data injection attacks in smart grids
Chen et al. Fiden: Intelligent fingerprint learning for attacker identification in the industrial Internet of Things
Kumar et al. Device fingerprinting for cyber-physical systems: a survey
Rosenthal et al. ARBA: Anomaly and reputation based approach for detecting infected IoT devices