论文标题

纳米分辨率视觉标识符在下一代网络物理系统中启用安全监视

Nano-Resolution Visual Identifiers Enable Secure Monitoring in Next-Generation Cyber-Physical Systems

论文作者

Wang, Hao, Chen, Xiwen, Razi, Abolfazl, Kozicki, Michael, Amin, Rahul, Manfredo, Mark

论文摘要

当今的供应链在很大程度上依赖于网络物理系统,例如智能运输,在线购物和电子商务。在任何实质性变化或搬迁后,通过基于Web的注册和对产品的身份验证实时跟踪商品是有利的。尽管在基于技术的跟踪系统中有了最近的优势,但大多数供应链仍然依赖于明确印刷的标签,例如条形码和快速响应(QR)代码,以进行跟踪。尽管这些标签负担得起且高效,但这些标签并没有针对伪造和克隆攻击,提出隐私问题。这是一个关键问题,因为近年来商品数据库中的一些安全漏洞造成了至关重要的社会和经济影响,例如身份丧失,社会恐慌和对社区的信任丧失。本文认为使用树突为纳米分辨率的视觉标识符来确保供应链的端到端系统。树突是通过通过电化学过程在透明底物上产生分形金属图案而形成的,由于其自​​然随机性,高熵和不可吻合的特征,可以用作安全标识符。提出的框架损害了用于标识和身份验证的后端程序,基于Web的移动设备应用程序以及云数据库。我们审查建筑设计,树突操作阶段(个性化,注册,检查),基于2D图形匹配的轻巧识别方法以及基于数字全息图(DH)的深3D图像身份验证方法。提出了两步搜索,以通过将搜索空间限制为在较低维空间中具有高相似性得分的样本来使系统可扩展。我们通过提出解决方案来确保树枝状侵害对抗性攻击的结论。

Today's supply chains heavily rely on cyber-physical systems such as intelligent transportation, online shopping, and E-commerce. It is advantageous to track goods in real-time by web-based registration and authentication of products after any substantial change or relocation. Despite recent advantages in technology-based tracking systems, most supply chains still rely on plainly printed tags such as barcodes and Quick Response (QR) codes for tracking purposes. Although affordable and efficient, these tags convey no security against counterfeit and cloning attacks, raising privacy concerns. It is a critical matter since a few security breaches in merchandise databases in recent years has caused crucial social and economic impacts such as identity loss, social panic, and loss of trust in the community. This paper considers an end-to-end system using dendrites as nano-resolution visual identifiers to secure supply chains. Dendrites are formed by generating fractal metallic patterns on transparent substrates through an electrochemical process, which can be used as secure identifiers due to their natural randomness, high entropy, and unclonable features. The proposed framework compromises the back-end program for identification and authentication, a web-based application for mobile devices, and a cloud database. We review architectural design, dendrite operational phases (personalization, registration, inspection), a lightweight identification method based on 2D graph-matching, and a deep 3D image authentication method based on Digital Holography (DH). A two-step search is proposed to make the system scalable by limiting the search space to samples with high similarity scores in a lower-dimensional space. We conclude by presenting our solution to make dendrites secure against adversarial attacks.

扫码加入交流群

加入微信交流群

微信交流群二维码

扫码加入学术交流群,获取更多资源