• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

对敌方控制环境的远程侦察。

Remote inspection of adversary-controlled environments.

作者信息

Tobisch Johannes, Philippe Sébastien, Barak Boaz, Kaplun Gal, Zenger Christian, Glaser Alexander, Paar Christof, Rührmair Ulrich

机构信息

Max Planck Institute for Security and Privacy, Bochum, Germany.

Program on Science and Global Security, Princeton University, Princeton, NJ, USA.

出版信息

Nat Commun. 2023 Oct 17;14(1):6566. doi: 10.1038/s41467-023-42314-2.

DOI:10.1038/s41467-023-42314-2
PMID:37848432
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC10582185/
Abstract

Remotely monitoring the location and enduring presence of valuable items in adversary-controlled environments presents significant challenges. In this article, we demonstrate a monitoring approach that leverages the gigahertz radio-wave scattering and absorption of a room and its contents, including a set of mirrors with random orientations placed inside, to remotely verify the absence of any disturbance over time. Our technique extends to large physical systems the application of physical unclonable functions for integrity protection. Its main applications are scenarios where parties are mutually distrustful and have privacy and security constraints. Examples range from the verification of nuclear arms-control treaties to the securing of currency, artwork, or data centers.

摘要

在敌方控制的环境中远程监控贵重物品的位置和持续存在情况面临重大挑战。在本文中,我们展示了一种监控方法,该方法利用房间及其内部物品(包括一组随机放置的镜子)的千兆赫兹无线电波散射和吸收,来远程验证随时间推移是否没有任何干扰。我们的技术将物理不可克隆功能在完整性保护方面的应用扩展到了大型物理系统。其主要应用场景是各方相互不信任且存在隐私和安全限制的情况。例子包括从核武器控制条约的核查到货币、艺术品或数据中心的安保。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/87cc/10582185/0e43e502aa49/41467_2023_42314_Fig3_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/87cc/10582185/74e96ac9f76a/41467_2023_42314_Fig1_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/87cc/10582185/3a633311556f/41467_2023_42314_Fig2_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/87cc/10582185/0e43e502aa49/41467_2023_42314_Fig3_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/87cc/10582185/74e96ac9f76a/41467_2023_42314_Fig1_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/87cc/10582185/3a633311556f/41467_2023_42314_Fig2_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/87cc/10582185/0e43e502aa49/41467_2023_42314_Fig3_HTML.jpg

相似文献

1
Remote inspection of adversary-controlled environments.对敌方控制环境的远程侦察。
Nat Commun. 2023 Oct 17;14(1):6566. doi: 10.1038/s41467-023-42314-2.
2
Real-Time Remote Health Monitoring Systems Using Body Sensor Information and Finger Vein Biometric Verification: A Multi-Layer Systematic Review.基于体传感器信息和指静脉生物特征验证的实时远程健康监测系统:一项多层次系统评价。
J Med Syst. 2018 Oct 16;42(12):238. doi: 10.1007/s10916-018-1104-5.
3
Achieving Source Location Privacy Protection in Monitoring Wireless Sensor Networks through Proxy Node Routing.通过代理节点路由实现监测无线传感器网络中的源位置隐私保护。
Sensors (Basel). 2019 Feb 28;19(5):1037. doi: 10.3390/s19051037.
4
Smart Home-based IoT for Real-time and Secure Remote Health Monitoring of Triage and Priority System using Body Sensors: Multi-driven Systematic Review.基于智能家居的物联网,利用身体传感器实现分诊和优先级系统的实时安全远程健康监测:多驱动系统评价。
J Med Syst. 2019 Jan 15;43(3):42. doi: 10.1007/s10916-019-1158-z.
5
A fine granularity based user collaboration algorithm for location privacy protection.一种基于细粒度的用户协作算法,用于保护位置隐私。
PLoS One. 2019 Jul 25;14(7):e0220278. doi: 10.1371/journal.pone.0220278. eCollection 2019.
6
Verification and validation of an automated robot inspection cell for automotive body-in-white: a use case for the VALU3S ECSEL project.用于汽车白车身的自动化机器人检测单元的验证与确认:VALU3S ECSEL项目的一个用例
Open Res Eur. 2021 Sep 29;1:115. doi: 10.12688/openreseurope.13627.1. eCollection 2021.
7
Source Anonymity in WSNs against Global Adversary Utilizing Low Transmission Rates with Delay Constraints.针对利用具有延迟约束的低传输速率的全局对手的无线传感器网络中的源匿名性
Sensors (Basel). 2016 Jun 27;16(7):957. doi: 10.3390/s16070957.
8
Octopus: A Novel Approach for Health Data Masking and Retrieving Using Physical Unclonable Functions and Machine Learning.章鱼:一种使用物理不可克隆函数和机器学习进行健康数据屏蔽和检索的新方法。
Sensors (Basel). 2023 Apr 18;23(8):4082. doi: 10.3390/s23084082.
9
A Lightweight RFID Mutual Authentication Protocol Based on Physical Unclonable Function.一种基于物理不可克隆功能的轻量级射频识别相互认证协议。
Sensors (Basel). 2018 Mar 2;18(3):760. doi: 10.3390/s18030760.
10
A physical unclonable neutron sensor for nuclear arms control inspections.一种用于核武器控制检查的物理不可克隆中子传感器。
Sci Rep. 2020 Nov 26;10(1):20605. doi: 10.1038/s41598-020-77459-3.

本文引用的文献

1
From Stochastic Foam to Designed Structure: Balancing Cost and Performance of Cellular Metals.从随机泡沫到设计结构:平衡多孔金属的成本与性能
Materials (Basel). 2017 Aug 8;10(8):922. doi: 10.3390/ma10080922.
2
Physical one-way functions.物理单向函数。
Science. 2002 Sep 20;297(5589):2026-30. doi: 10.1126/science.1074376.