z-logo
open-access-imgOpen Access
ICMetric Security System for Achieving Embedded Devices Security
Author(s) -
Duaa Al Dosary,
Khattab M. Ali Alheeti,
Salah Sleibi Al-Rawi
Publication year - 2021
Publication title -
journal of physics. conference series
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.21
H-Index - 85
eISSN - 1742-6596
pISSN - 1742-6588
DOI - 10.1088/1742-6596/1804/1/012102
Subject(s) - identification (biology) , computer science , password , exploit , embedded system , authentication (law) , security system , gyroscope , computer security , trace (psycholinguistics) , computer hardware , engineering , botany , biology , aerospace engineering , linguistics , philosophy
The interesting with embedded systems is related to the matters of providing privacy and security. There is a need to ensure the integrity and authenticity of the system. The methods such as passwords can be stolen or forgotten therefore the security of any data kept on the system can be exposed by any unauthorised access. In this paper, a new proposal is introduced that exploits Integrated Circuit Metrics (ICMetric) technology to provide identification and improve system security. ICMetric generates device identification based on the features of a device. In this paper, device identification can be generated by using the MEMS sensors, which are gyroscope and magnetometer embedded in many devices. The experiment is based on sensors embedded in intelligent wheelchair. Readings are obtained from the sensors and analysed mathematically and statistically to generate ICMetric number that used to provide identification of the device. ICMetric number is integrated to the dataset extracted from the trace file generated by network simulator version two (ns-2). If the system is attacked, there will be no theft because the ICMetric is not stored on the system and can be regenerated when necessary. The proposed system shows that the using of MEMS sensors to generate ICMetric number increase authentication and security of the system. The simulation results have been compared and studied for high levels of performance metrics and detection capability.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here