Intentional Electromagnetic Interference Attack on Sensors and Actuators
dc.contributor.advisor | Mani Mina | |
dc.contributor.author | Selvaraj, Jayaprakash | |
dc.contributor.department | Department of Electrical and Computer Engineering | |
dc.date | 2018-08-11T14:55:11.000 | |
dc.date.accessioned | 2020-06-30T03:11:15Z | |
dc.date.available | 2020-06-30T03:11:15Z | |
dc.date.copyright | Tue May 01 00:00:00 UTC 2018 | |
dc.date.embargo | 2001-01-01 | |
dc.date.issued | 2018-01-01 | |
dc.description.abstract | <p>Embedded systems are critically relying on the integrity its input and output signals to ensure proper operation. Signal from sensors, either analog or digital, are blindly trusted by the embedded systems, to estimate the environment, in which the system is set to monitor and respond to. Similarly, actuators, that are connected to and controlled by an embedded system, are expected to behave in a reliable manner, to perform a particular physical motion. However, recent publications, from hardware security researchers, have shown that sensor signals can be manipulated by injection of false data, using intentional electromagnetic interference (IEMI). In this work, the author proves that both the input as well as the output signals of an embedded system are vulnerable to data manipulation, via physical layer of this system, which would bypass any traditional defense mechanism.</p> <p>By using specially crafted IEMI attack techniques, this work has shown that the physical layer input/ output signals can be manipulated by an attacker, thereby providing the attacker, with the ability to remotely control an embedded system. Three different attack scenarios had been analyzed and the effectiveness of the attack against each scenario has been experimentally verified. First, an embedded system, gathering data through an analog sensor, was manipulated to output arbitrary sensor data, while in the second scenario, a slightly modified attack technique, has been shown to successfully inject false data into digital communication lines. Finally, commonly used digital actuators, which were controlled by embedded system, has been shown as a potential target for false data injection attack, using IEMI techniques. These attacks have been shown to be effective, at appreciable distances from the victim circuit, while using attack signals with relatively less power.</p> | |
dc.format.mimetype | application/pdf | |
dc.identifier | archive/lib.dr.iastate.edu/etd/16460/ | |
dc.identifier.articleid | 7467 | |
dc.identifier.contextkey | 12331526 | |
dc.identifier.doi | https://doi.org/10.31274/etd-180810-6090 | |
dc.identifier.s3bucket | isulib-bepress-aws-west | |
dc.identifier.submissionpath | etd/16460 | |
dc.identifier.uri | https://dr.lib.iastate.edu/handle/20.500.12876/30643 | |
dc.language.iso | en | |
dc.source.bitstream | archive/lib.dr.iastate.edu/etd/16460/Selvaraj_iastate_0097E_17139.pdf|||Fri Jan 14 21:00:43 UTC 2022 | |
dc.subject.disciplines | Electrical and Electronics | |
dc.subject.disciplines | Electromagnetics and Photonics | |
dc.subject.keywords | EM attack | |
dc.subject.keywords | IEMI | |
dc.subject.keywords | Near field coupling | |
dc.title | Intentional Electromagnetic Interference Attack on Sensors and Actuators | |
dc.type | dissertation | |
dc.type.genre | dissertation | |
dspace.entity.type | Publication | |
relation.isOrgUnitOfPublication | a75a044c-d11e-44cd-af4f-dab1d83339ff | |
thesis.degree.discipline | Electrical Engineering | |
thesis.degree.level | dissertation | |
thesis.degree.name | Doctor of Philosophy |
File
Original bundle
1 - 1 of 1
No Thumbnail Available
- Name:
- Selvaraj_iastate_0097E_17139.pdf
- Size:
- 3.45 MB
- Format:
- Adobe Portable Document Format
- Description: