2022
DOI: 10.3390/s22051882
|View full text |Cite
|
Sign up to set email alerts
|

PSPS: A Step toward Tamper Resistance against Physical Computer Intrusion

Abstract: Cyberattacks are increasing in both number and severity for private, corporate, and governmental bodies. To prevent these attacks, many intrusion detection systems and intrusion prevention systems provide computer security by monitoring network packets and auditing system records. However, most of these systems only monitor network packets rather than the computer itself, so physical intrusion is also an important security issue. Furthermore, with the rapid progress of the Internet of Things (IoT) technology, … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(5 citation statements)
references
References 11 publications
0
5
0
Order By: Relevance
“…Lastly, Lu et al (2022) that offer a physical security system that can defend data from unauthorized access when the computer chassis is opened or tampered with. They used sensor switches to monitor the chassis status at all times and upload event logs to a cloud server for remote monitoring.…”
Section: Related Workmentioning
confidence: 99%
“…Lastly, Lu et al (2022) that offer a physical security system that can defend data from unauthorized access when the computer chassis is opened or tampered with. They used sensor switches to monitor the chassis status at all times and upload event logs to a cloud server for remote monitoring.…”
Section: Related Workmentioning
confidence: 99%
“…On the basis of FN and FP, it serves as a statistical metric to evaluate the effectiveness of a specific classifier [50,51]. It is defined as the harmonic mean of recall and precision, as defined in Equation (15). The Precision value is described as the correctness of judgement and the values obtained in the current study are projected in Figure 12.…”
Section: Performance Of Rf Classifiermentioning
confidence: 99%
“…From the four-layer architecture it is understandable that the data collected from the environment has a greater impact over the entire IoT architecture, as any corruption in the SED-data can result in overall system failure [ 11 ]. SED faults occur for a variety of reasons, such as wear and tear [ 12 ], calibration error, physical damage, hostile environment due to heat [ 13 ], vibration [ 14 ], network failure or intentional tampering [ 15 ]. A SED may sustain the damage but then the fault must be identified as soon as it originates to save the data-driven system.…”
Section: Introductionmentioning
confidence: 99%
“…Probing detection methods are also discussed to protect against tampering and invasive attacks [ 28 , 29 ]. One common solution against tampering is the use of tamper-proof enclosures, also known as envelopes or shields, which are designed to monitor their integrity [ 30 ], temperature changes [ 31 ], proximity of foreign objects [ 32 ], and casing openings [ 33 ].…”
Section: Introductionmentioning
confidence: 99%