Skip to main content

Approach to Side Channel-Based Cybersecurity Monitoring for Autonomous Unmanned Objects

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 11659))

Abstract

In this paper, problematic issues in ensuring the cybersecurity of autonomous unmanned objects were considered. Moreover, prerequisites that determine the need for external monitoring systems were identified. The type and statistical characteristics used for the analysis and classification of sound signals were also shown. The proposed approach to the analysis of the cybersecurity condition of an autonomous object is based on classification methods and allows the identification of the current status based on digitized acoustic information processing. An experiment aimed at obtaining statistical information on various types of unmanned object maneuvers with various arrangements of an audio recorder was conducted. The data obtained was processed using two-layer feed-forward neural networks with sigmoid hidden neurons. Hence, the problem of identifying the cybersecurity condition of autonomous unmanned objects on the basis of processing acoustic signal information obtained through side channels was solved. Digitized information from an acoustic sensor (microphone) located statically in the experiment area was classified more accurately than from the microphone located directly on the autonomous object. With a minimum time of statistical information accumulation using the proposed approach, it becomes possible to identify differences in maneuvers performed by the unmanned object and, consequently, the cybersecurity condition of the object with a probability close to 0.7. The proposed approach for processing signal information can be used as an additional independent element to determine the cybersecurity condition of autonomous objects of unmanned systems. This approach can be quickly adapted using various mathematical tools and machine learning methods to achieve a given quality probabilistic assessment.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Page, J., Zaslavsky, A., Indrawan, M.: Countering security vulnerabilities using a shared security buddy model schema in mobile agent communities. In: Proceedings of the First International Workshop on Safety and Security in Multi-Agent Systems (SASEMAS 2004), pp. 85–101 (2004)

    Google Scholar 

  2. Semenov, V., Lebedev, I., Sukhoparov, M.: Identification of the state of individual elements of cyber-physical systems based on external behavioral characteristics. Appl. Inform. 13(5/77), 72–83 (2018)

    Google Scholar 

  3. Hayashi, Y., Homma, N., Watanabe, T., Price, W., Radasky, W.: Introduction to the special section on electromagnetic information security. Proc. IEEE Trans. Electromagn. Compat. 55(3), 539–546 (2013)

    Article  Google Scholar 

  4. Han, Y., Christoudis, I., Diamantaras, K., Zonouz, S., Petropulu, A.: Side-channel-based code-execution monitoring systems: a survey. IEEE Signal Process. Mag. 36(2), 22–35 (2019)

    Article  Google Scholar 

  5. de Souza Faria, G., Kim, H.: Differential audio analysis: a new side-channel attack on PIN pads. Int. J. Inf. Secur. 18(1), 73–84 (2019)

    Article  Google Scholar 

  6. Gupta, H., Sural, S., Atluri, V., Vaidya, J.: A side-channel attack on smartphones: deciphering key taps using built-in microphones. J. Comput. Secur. 26(2), 255–281 (2018)

    Article  Google Scholar 

  7. Sukhoparov, M., Semenov, V., Lebedev, I.: Monitoring of cybersecurity elements of cyber-physical systems using artificial neural networks. Methods Tech. Means Ensuring Inf. Secur. 27, 59–60 (2018)

    Google Scholar 

  8. Semenov, V., Lebedev, I., Sukhoparov, M.: Approach to classification of the information security state of elements for cyber-physical systems by applying side electromagnetic radiation. Sci. Tech. J. Inf. Technol. Mech. Opt. 18(1/113), 98–105 (2018). https://doi.org/10.17586/2226-1494-2018-18-1-98-105

    Article  Google Scholar 

  9. Semenov, V., Sukhoparov, M., Lebedev, I.: An approach to classification of the information security state of elements of cyber-physical systems using side electromagnetic radiation. In: Galinina, O., Andreev, S., Balandin, S., Koucheryavy, Y. (eds.) NEW2AN/ruSMART 2018. LNCS, vol. 11118, pp. 289–298. Springer, Cham (2018). https://doi.org/10.1007/978-3-030-01168-0_27

    Chapter  Google Scholar 

  10. Al Faruque, M., Chhetri, S., Canedo, A., Wan, J.: Acoustic side-channel attacks on additive manufacturing systems. In: Proceedings of ACM/IEEE 7th International Conference on Cyber-Physical Systems (2016). https://doi.org/10.1109/iccps.2016.7479068

  11. Genkin, D., Shamir, A., Tromer, E.: Acoustic cryptanalysis. J. Cryptol. 30(2), 392–443 (2017)

    Article  Google Scholar 

  12. Farrokhmanesh, M., Hamzeh, A.: Music classification as a new approach for malware detection. J. Comput. Virol. Hacking Tech. 1–20 (2018). https://doi.org/10.1007/s11416-018-0321-2

    Article  Google Scholar 

  13. Lebedev, I., et al.: The analysis of abnormal behavior of the system local segment on the basis of statistical data obtained from the network infrastructure monitoring. In: Galinina, O., Balandin, S., Koucheryavy, Y. (eds.) NEW2AN/ruSMART 2016. LNCS, vol. 9870, pp. 503–511. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-46301-8_42

    Chapter  Google Scholar 

  14. Marinenkov, E., Viksnin, I., Zhukova, Yu., Usova, M.: Analysis of information interaction security within group of unmanned aerial vehicles. Sci. Tech. J. Inf. Technol. Mech. Opt. 18(5), 817–825 (2018)

    Google Scholar 

  15. Semenov, V., Lebedev, I.: Analysis of the state of cybersecurity of transport systems objects. Regional Informatics (RI-2018). In: Proceedings of the XVI St. Petersburg International Conference “Regional Informatics (RI-2018)”, pp. 324–325 (2018)

    Google Scholar 

  16. Sridhar, P., Sheikh-Bahaei, S., Xia, S., Jamshidi, Mo.: Multi agent simulation using discrete event and soft-computing methodologies. In: Proceedings of the IEEE International Conference on Systems, Man and Cybernetics, vol. 2, pp. 1711–1716 (2003)

    Google Scholar 

  17. Krivtsova, I., et al.: Implementing a broadcast storm attack on a mission-critical wireless sensor network. In: Mamatas, L., Matta, I., Papadimitriou, P., Koucheryavy, Y. (eds.) WWIC 2016. LNCS, vol. 9674, pp. 297–308. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-33936-8_23

    Chapter  Google Scholar 

  18. Han, Y., Etigowni, S., Liu, H., Zonouz, S., Petropulu, A.: Watch me, but don’t touch me! Contactless control flow monitoring via electromagnetic emanations. In: Proceedings of the ACM Conference on Computer and Communications Security, pp. 1095–1108 (2017)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Viktor Semenov .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Semenov, V., Sukhoparov, M., Lebedev, I. (2019). Approach to Side Channel-Based Cybersecurity Monitoring for Autonomous Unmanned Objects. In: Ronzhin, A., Rigoll, G., Meshcheryakov, R. (eds) Interactive Collaborative Robotics. ICR 2019. Lecture Notes in Computer Science(), vol 11659. Springer, Cham. https://doi.org/10.1007/978-3-030-26118-4_27

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-26118-4_27

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-26117-7

  • Online ISBN: 978-3-030-26118-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics