TY - JOUR
T1 - Introduction to electromagnetic information security
AU - Hayashi, Yu ichi
AU - Homma, Naofumi
N1 - Publisher Copyright:
Copyright © 2019 The Institute of Electronics, Information and Communication Engineers
PY - 2019/1
Y1 - 2019/1
N2 - With the rising importance of information security, the necessity of implementing better security measures in the physical layer as well as the upper layers is becoming increasing apparent. Given the development of more accurate and less expensive measurement devices, high-performance computers, and larger storage devices, the threat of advanced attacks at the physical level has expanded from the military and governmental spheres to commercial products. In this paper, we review the issue of information security degradation through electromagnetic (EM)-based compromising of security measures in the physical layer (i.e., EM information security). Owing to the invisibility of EM radiation, such attacks can be serious threats. We first introduce the mechanism of information leakage through EM radiation and interference and then present possible countermeasures. Finally, we explain the latest research and standardization trends related to EM information security.
AB - With the rising importance of information security, the necessity of implementing better security measures in the physical layer as well as the upper layers is becoming increasing apparent. Given the development of more accurate and less expensive measurement devices, high-performance computers, and larger storage devices, the threat of advanced attacks at the physical level has expanded from the military and governmental spheres to commercial products. In this paper, we review the issue of information security degradation through electromagnetic (EM)-based compromising of security measures in the physical layer (i.e., EM information security). Owing to the invisibility of EM radiation, such attacks can be serious threats. We first introduce the mechanism of information leakage through EM radiation and interference and then present possible countermeasures. Finally, we explain the latest research and standardization trends related to EM information security.
KW - Electromagnetic compatibility
KW - EM information security
KW - Fault analysis
KW - Hardware Trojan horse
KW - Side-channel attacks
KW - TEMPEST
UR - http://www.scopus.com/inward/record.url?scp=85059973410&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85059973410&partnerID=8YFLogxK
U2 - 10.1587/transcom.2018EBI0001
DO - 10.1587/transcom.2018EBI0001
M3 - Article
AN - SCOPUS:85059973410
SN - 0916-8516
SP - 40
EP - 50
JO - IEICE Transactions on Communications
JF - IEICE Transactions on Communications
IS - 1
ER -