RF Transceiver Security Against Piracy Attacks

نویسندگان

چکیده

We demonstrate for the first time system-level locking RF transceivers serving as an anti-piracy security technique. The strategy is to make performance key-dependent by leveraging a state-of-the-art logic technique obfuscate digital blocks in signal path. presents several advantages, including general applicability, effective incorrect keys, attack resilience, transparency when correct key used, minimum overheads, and ease of implementation. show that cannot be blindly applied this context and, regard, we how it can adapted towards transceiver locking. A proof-of-concept demonstrated with hardware measurements.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Ultra-Wideband RF Transceiver

Where, C is the channel capacity, BW is the bandwidth, SNR is the ratio of average received signal power to the noise spectral density. It can be seen from (1), channel capacity increases linearly with bandwidth but only logarithmically with SNR which means capacity increases as a function of BW faster than as a function of SNR and with a wide bandwidth, high data rate can be achieved with a lo...

متن کامل

Security Against Selective Opening Attacks

This survey will deal with the problem of selective opening attacks (SOA). We will present the known results (both possibility and impossibility ones) and the main open questions related to SOA. Despite the importance of this problem, many of the important questions were open until very recently and some important questions about the power of SOA are still open.

متن کامل

Low Energy RF Transceiver Design

Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. To copy otherwise, to republish, to post on servers or to redistribute to lists, requires prior specific permission....

متن کامل

An active security protocol against DoS attacks

Denial of Service (DoS ) attacks represent, in today's Internet, one of the most complex issues to address. A session is under a DoS attack if it cannot achieve its intended throughput due to the misbehavior of other sessions. Many research studies dealt with DoS, proposing models and/or architectures mostly based on an attack prevention approach. Prevention techniques lead to di erent models, ...

متن کامل

Security Against Impersonation Attacks in Distributed Systems

In a multi-agent system, transitioning from a centralized to a distributed decision-making strategy can introduce vulnerability to adversarial manipulation. We study the potential for adversarial manipulation in a class of graphical coordination games where the adversary can pose as a friendly agent in the game, thereby influencing the decision-making rules of a subset of agents. The adversary’...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Transactions on Circuits and Systems Ii-express Briefs

سال: 2022

ISSN: ['1549-7747', '1558-3791']

DOI: https://doi.org/10.1109/tcsii.2022.3165709