The role of metrology in the cyber-security of embedded devices
DOI:
https://doi.org/10.21014/actaimeko.v12i2.1455Keywords:
smart card, vulnerability assessment, side-channel attack, metrologyAbstract
The cyber-security of an embedded device is a crucial issue especially in the Internet of Things (IoT) paradigm, since the physical accessibility to the smart transducers eases an attacker to eavesdrop the exchanged messages. In this manuscript, the role of metrology in improving the characterization and security testing of embedded devices is discussed in terms of vulnerability testing and robustness evaluation. The presented methods ensure an accurate assessment of the device’s security by relying on statistical analysis and design of experiments. A particular focus is given on power analysis by means of a scatter attack. In this context, the metrological approach contributes to guaranteeing the confidentiality and integrity of the data exchanged by IoT transducers.
Downloads
Published
Issue
Section
License
Copyright (c) 2023 Pasquale Arpaia, Francesco Caputo, Antonella Cioffi, Antonio Esposito

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under the CC BY 4.0, Creative Commons Attribution 4.0 International License.
Users are free to
- share, i.e. copy and redistribute the material in any medium or format for any purpose, even commercially;
- adapt, i.e. remix, transform, and build upon the material for any purpose, even commercially.
At the same time, the user must give appropriate credit, provide a link to the license, and indicate if changes were made.
Additional information about the license can be found at: https://creativecommons.org/licenses/by/4.0/.
Authors are
- able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).