Advertisement

Approach to Side Channel-Based Cybersecurity Monitoring for Autonomous Unmanned Objects

  • Viktor SemenovEmail author
  • Mikhail Sukhoparov
  • Ilya Lebedev
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 11659)

Abstract

In this paper, problematic issues in ensuring the cybersecurity of autonomous unmanned objects were considered. Moreover, prerequisites that determine the need for external monitoring systems were identified. The type and statistical characteristics used for the analysis and classification of sound signals were also shown. The proposed approach to the analysis of the cybersecurity condition of an autonomous object is based on classification methods and allows the identification of the current status based on digitized acoustic information processing. An experiment aimed at obtaining statistical information on various types of unmanned object maneuvers with various arrangements of an audio recorder was conducted. The data obtained was processed using two-layer feed-forward neural networks with sigmoid hidden neurons. Hence, the problem of identifying the cybersecurity condition of autonomous unmanned objects on the basis of processing acoustic signal information obtained through side channels was solved. Digitized information from an acoustic sensor (microphone) located statically in the experiment area was classified more accurately than from the microphone located directly on the autonomous object. With a minimum time of statistical information accumulation using the proposed approach, it becomes possible to identify differences in maneuvers performed by the unmanned object and, consequently, the cybersecurity condition of the object with a probability close to 0.7. The proposed approach for processing signal information can be used as an additional independent element to determine the cybersecurity condition of autonomous objects of unmanned systems. This approach can be quickly adapted using various mathematical tools and machine learning methods to achieve a given quality probabilistic assessment.

Keywords

Cybersecurity Autonomous unmanned objects Data processing Neural networks Cybersecurity monitoring systems 

References

  1. 1.
    Page, J., Zaslavsky, A., Indrawan, M.: Countering security vulnerabilities using a shared security buddy model schema in mobile agent communities. In: Proceedings of the First International Workshop on Safety and Security in Multi-Agent Systems (SASEMAS 2004), pp. 85–101 (2004)Google Scholar
  2. 2.
    Semenov, V., Lebedev, I., Sukhoparov, M.: Identification of the state of individual elements of cyber-physical systems based on external behavioral characteristics. Appl. Inform. 13(5/77), 72–83 (2018)Google Scholar
  3. 3.
    Hayashi, Y., Homma, N., Watanabe, T., Price, W., Radasky, W.: Introduction to the special section on electromagnetic information security. Proc. IEEE Trans. Electromagn. Compat. 55(3), 539–546 (2013)CrossRefGoogle Scholar
  4. 4.
    Han, Y., Christoudis, I., Diamantaras, K., Zonouz, S., Petropulu, A.: Side-channel-based code-execution monitoring systems: a survey. IEEE Signal Process. Mag. 36(2), 22–35 (2019)CrossRefGoogle Scholar
  5. 5.
    de Souza Faria, G., Kim, H.: Differential audio analysis: a new side-channel attack on PIN pads. Int. J. Inf. Secur. 18(1), 73–84 (2019)CrossRefGoogle Scholar
  6. 6.
    Gupta, H., Sural, S., Atluri, V., Vaidya, J.: A side-channel attack on smartphones: deciphering key taps using built-in microphones. J. Comput. Secur. 26(2), 255–281 (2018)CrossRefGoogle Scholar
  7. 7.
    Sukhoparov, M., Semenov, V., Lebedev, I.: Monitoring of cybersecurity elements of cyber-physical systems using artificial neural networks. Methods Tech. Means Ensuring Inf. Secur. 27, 59–60 (2018)Google Scholar
  8. 8.
    Semenov, V., Lebedev, I., Sukhoparov, M.: Approach to classification of the information security state of elements for cyber-physical systems by applying side electromagnetic radiation. Sci. Tech. J. Inf. Technol. Mech. Opt. 18(1/113), 98–105 (2018).  https://doi.org/10.17586/2226-1494-2018-18-1-98-105CrossRefGoogle Scholar
  9. 9.
    Semenov, V., Sukhoparov, M., Lebedev, I.: An approach to classification of the information security state of elements of cyber-physical systems using side electromagnetic radiation. In: Galinina, O., Andreev, S., Balandin, S., Koucheryavy, Y. (eds.) NEW2AN/ruSMART 2018. LNCS, vol. 11118, pp. 289–298. Springer, Cham (2018).  https://doi.org/10.1007/978-3-030-01168-0_27CrossRefGoogle Scholar
  10. 10.
    Al Faruque, M., Chhetri, S., Canedo, A., Wan, J.: Acoustic side-channel attacks on additive manufacturing systems. In: Proceedings of ACM/IEEE 7th International Conference on Cyber-Physical Systems (2016).  https://doi.org/10.1109/iccps.2016.7479068
  11. 11.
    Genkin, D., Shamir, A., Tromer, E.: Acoustic cryptanalysis. J. Cryptol. 30(2), 392–443 (2017)CrossRefGoogle Scholar
  12. 12.
    Farrokhmanesh, M., Hamzeh, A.: Music classification as a new approach for malware detection. J. Comput. Virol. Hacking Tech. 1–20 (2018).  https://doi.org/10.1007/s11416-018-0321-2CrossRefGoogle Scholar
  13. 13.
    Lebedev, I., et al.: The analysis of abnormal behavior of the system local segment on the basis of statistical data obtained from the network infrastructure monitoring. In: Galinina, O., Balandin, S., Koucheryavy, Y. (eds.) NEW2AN/ruSMART 2016. LNCS, vol. 9870, pp. 503–511. Springer, Cham (2016).  https://doi.org/10.1007/978-3-319-46301-8_42CrossRefGoogle Scholar
  14. 14.
    Marinenkov, E., Viksnin, I., Zhukova, Yu., Usova, M.: Analysis of information interaction security within group of unmanned aerial vehicles. Sci. Tech. J. Inf. Technol. Mech. Opt. 18(5), 817–825 (2018)Google Scholar
  15. 15.
    Semenov, V., Lebedev, I.: Analysis of the state of cybersecurity of transport systems objects. Regional Informatics (RI-2018). In: Proceedings of the XVI St. Petersburg International Conference “Regional Informatics (RI-2018)”, pp. 324–325 (2018)Google Scholar
  16. 16.
    Sridhar, P., Sheikh-Bahaei, S., Xia, S., Jamshidi, Mo.: Multi agent simulation using discrete event and soft-computing methodologies. In: Proceedings of the IEEE International Conference on Systems, Man and Cybernetics, vol. 2, pp. 1711–1716 (2003)Google Scholar
  17. 17.
    Krivtsova, I., et al.: Implementing a broadcast storm attack on a mission-critical wireless sensor network. In: Mamatas, L., Matta, I., Papadimitriou, P., Koucheryavy, Y. (eds.) WWIC 2016. LNCS, vol. 9674, pp. 297–308. Springer, Cham (2016).  https://doi.org/10.1007/978-3-319-33936-8_23CrossRefGoogle Scholar
  18. 18.
    Han, Y., Etigowni, S., Liu, H., Zonouz, S., Petropulu, A.: Watch me, but don’t touch me! Contactless control flow monitoring via electromagnetic emanations. In: Proceedings of the ACM Conference on Computer and Communications Security, pp. 1095–1108 (2017)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  1. 1.St. Petersburg Institute for Informatics and Automation of the Russian Academy of SciencesSaint PetersburgRussia

Personalised recommendations