{"id":"https://openalex.org/W4313594094","doi":"https://doi.org/10.1016/j.jnca.2022.103579","title":"A methodology to identify identical single-board computers based on hardware behavior fingerprinting","display_name":"A methodology to identify identical single-board computers based on hardware behavior fingerprinting","publication_year":2023,"publication_date":"2023-01-03","ids":{"openalex":"https://openalex.org/W4313594094","doi":"https://doi.org/10.1016/j.jnca.2022.103579"},"language":"en","primary_location":{"id":"doi:10.1016/j.jnca.2022.103579","is_oa":true,"landing_page_url":"https://doi.org/10.1016/j.jnca.2022.103579","pdf_url":null,"source":{"id":"https://openalex.org/S30128005","display_name":"Journal of Network and Computer Applications","issn_l":"1084-8045","issn":["1084-8045","1095-8592"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Network and Computer Applications","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","datacite"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://doi.org/10.1016/j.jnca.2022.103579","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5068451806","display_name":"Pedro Miguel S\u00e1nchez S\u00e1nchez","orcid":"https://orcid.org/0000-0002-6444-2102"},"institutions":[{"id":"https://openalex.org/I80180929","display_name":"Universidad de Murcia","ror":"https://ror.org/03p3aeb86","country_code":"ES","type":"education","lineage":["https://openalex.org/I80180929"]}],"countries":["ES"],"is_corresponding":true,"raw_author_name":"Pedro Miguel S\u00e1nchez S\u00e1nchez","raw_affiliation_strings":["Department of Information and Communications Engineering, University of Murcia, Murcia 30100, Spain"],"raw_orcid":"https://orcid.org/0000-0002-6444-2102","affiliations":[{"raw_affiliation_string":"Department of Information and Communications Engineering, University of Murcia, Murcia 30100, Spain","institution_ids":["https://openalex.org/I80180929"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5008356532","display_name":"Jos\u00e9 Mar\u00eda Jorquera Valero","orcid":"https://orcid.org/0000-0003-1365-7573"},"institutions":[{"id":"https://openalex.org/I80180929","display_name":"Universidad de Murcia","ror":"https://ror.org/03p3aeb86","country_code":"ES","type":"education","lineage":["https://openalex.org/I80180929"]}],"countries":["ES"],"is_corresponding":false,"raw_author_name":"Jos\u00e9 Mar\u00eda Jorquera Valero","raw_affiliation_strings":["Department of Information and Communications Engineering, University of Murcia, Murcia 30100, Spain"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Information and Communications Engineering, University of Murcia, Murcia 30100, Spain","institution_ids":["https://openalex.org/I80180929"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5063531116","display_name":"Alberto Huertas Celdr\u00e1n","orcid":"https://orcid.org/0000-0001-7125-1710"},"institutions":[{"id":"https://openalex.org/I202697423","display_name":"University of Zurich","ror":"https://ror.org/02crff812","country_code":"CH","type":"education","lineage":["https://openalex.org/I202697423"]}],"countries":["CH"],"is_corresponding":false,"raw_author_name":"Alberto Huertas Celdr\u00e1n","raw_affiliation_strings":["Communication Systems Group (CSG), Department of Informatics (IfI), University of Zurich UZH, 8050 Z\u00fcrich, Switzerland"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Communication Systems Group (CSG), Department of Informatics (IfI), University of Zurich UZH, 8050 Z\u00fcrich, Switzerland","institution_ids":["https://openalex.org/I202697423"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5070889566","display_name":"G\u00e9r\u00f4me Bovet","orcid":"https://orcid.org/0000-0002-4534-3483"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"G\u00e9r\u00f4me Bovet","raw_affiliation_strings":["Cyber-Defence Campus, armasuisse Science & Technology, 3602 Thun, Switzerland"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Cyber-Defence Campus, armasuisse Science & Technology, 3602 Thun, Switzerland","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5033414840","display_name":"Manuel Gil P\u00e9rez","orcid":"https://orcid.org/0000-0002-7768-9665"},"institutions":[{"id":"https://openalex.org/I80180929","display_name":"Universidad de Murcia","ror":"https://ror.org/03p3aeb86","country_code":"ES","type":"education","lineage":["https://openalex.org/I80180929"]}],"countries":["ES"],"is_corresponding":false,"raw_author_name":"Manuel Gil P\u00e9rez","raw_affiliation_strings":["Department of Information and Communications Engineering, University of Murcia, Murcia 30100, Spain"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Information and Communications Engineering, University of Murcia, Murcia 30100, Spain","institution_ids":["https://openalex.org/I80180929"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5059796926","display_name":"Gregorio Mart\u00ednez P\u00e9rez","orcid":"https://orcid.org/0000-0001-5532-6604"},"institutions":[{"id":"https://openalex.org/I80180929","display_name":"Universidad de Murcia","ror":"https://ror.org/03p3aeb86","country_code":"ES","type":"education","lineage":["https://openalex.org/I80180929"]}],"countries":["ES"],"is_corresponding":false,"raw_author_name":"Gregorio Mart\u00ednez P\u00e9rez","raw_affiliation_strings":["Department of Information and Communications Engineering, University of Murcia, Murcia 30100, Spain"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Information and Communications Engineering, University of Murcia, Murcia 30100, Spain","institution_ids":["https://openalex.org/I80180929"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5068451806"],"corresponding_institution_ids":["https://openalex.org/I80180929"],"apc_list":{"value":3140,"currency":"USD","value_usd":3140},"apc_paid":{"value":3140,"currency":"USD","value_usd":3140},"fwci":2.8784,"has_fulltext":false,"cited_by_count":15,"citation_normalized_percentile":{"value":0.91556794,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":"212","issue":null,"first_page":"103579","last_page":"103579"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8723080158233643},{"id":"https://openalex.org/keywords/spoofing-attack","display_name":"Spoofing attack","score":0.6296827793121338},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.616864800453186},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.6163505911827087},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.5433209538459778},{"id":"https://openalex.org/keywords/fingerprint","display_name":"Fingerprint (computing)","score":0.49974560737609863},{"id":"https://openalex.org/keywords/firmware","display_name":"Firmware","score":0.48616477847099304},{"id":"https://openalex.org/keywords/identification","display_name":"Identification (biology)","score":0.4809367060661316},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.44015878438949585},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.43279463052749634},{"id":"https://openalex.org/keywords/computer-hardware","display_name":"Computer hardware","score":0.39113539457321167},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3028300404548645},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2410634160041809},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.13492879271507263},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.1205938458442688}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8723080158233643},{"id":"https://openalex.org/C167900197","wikidata":"https://www.wikidata.org/wiki/Q11081100","display_name":"Spoofing attack","level":2,"score":0.6296827793121338},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.616864800453186},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.6163505911827087},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.5433209538459778},{"id":"https://openalex.org/C2777826928","wikidata":"https://www.wikidata.org/wiki/Q3745713","display_name":"Fingerprint (computing)","level":2,"score":0.49974560737609863},{"id":"https://openalex.org/C67212190","wikidata":"https://www.wikidata.org/wiki/Q104851","display_name":"Firmware","level":2,"score":0.48616477847099304},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.4809367060661316},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.44015878438949585},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.43279463052749634},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.39113539457321167},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3028300404548645},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2410634160041809},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.13492879271507263},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.1205938458442688},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0},{"id":"https://openalex.org/C59822182","wikidata":"https://www.wikidata.org/wiki/Q441","display_name":"Botany","level":1,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1016/j.jnca.2022.103579","is_oa":true,"landing_page_url":"https://doi.org/10.1016/j.jnca.2022.103579","pdf_url":null,"source":{"id":"https://openalex.org/S30128005","display_name":"Journal of Network and Computer Applications","issn_l":"1084-8045","issn":["1084-8045","1095-8592"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Network and Computer Applications","raw_type":"journal-article"},{"id":"pmh:oai:www.zora.uzh.ch:255602","is_oa":true,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4306401281","display_name":"Zurich Open Repository and Archive (University of Zurich)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I202697423","host_organization_name":"University of Zurich","host_organization_lineage":["https://openalex.org/I202697423"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"S\u00e1nchez S\u00e1nchez, Pedro Miguel; Jorquera Valero, Jos\u00e9 Mar\u00eda; Huertas Celdran, Alberto; Bovet, G\u00e9r\u00f4me; Gil P\u00e9rez, Manuel; P\u00e9rez, Gregorio Mart\u00ednez  (2023). A methodology to identify identical single-board computers based on hardware behavior fingerprinting.  Journal of Network and Computer Applications, 212:103579.","raw_type":"info:eu-repo/semantics/publishedVersion"},{"id":"doi:10.5167/uzh-255602","is_oa":true,"landing_page_url":"https://doi.org/10.5167/uzh-255602","pdf_url":null,"source":{"id":"https://openalex.org/S7407051291","display_name":"Universit\u00e4t Z\u00fcrich, ZORA","issn_l":null,"issn":[],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article-journal"}],"best_oa_location":{"id":"doi:10.1016/j.jnca.2022.103579","is_oa":true,"landing_page_url":"https://doi.org/10.1016/j.jnca.2022.103579","pdf_url":null,"source":{"id":"https://openalex.org/S30128005","display_name":"Journal of Network and Computer Applications","issn_l":"1084-8045","issn":["1084-8045","1095-8592"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Network and Computer Applications","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":57,"referenced_works":["https://openalex.org/W171639838","https://openalex.org/W1605172130","https://openalex.org/W1978973474","https://openalex.org/W2029594338","https://openalex.org/W2048999575","https://openalex.org/W2070074868","https://openalex.org/W2104599106","https://openalex.org/W2121473755","https://openalex.org/W2122237830","https://openalex.org/W2142668586","https://openalex.org/W2405780103","https://openalex.org/W2525711947","https://openalex.org/W2605049359","https://openalex.org/W2801576564","https://openalex.org/W2887792592","https://openalex.org/W2889741439","https://openalex.org/W2891512841","https://openalex.org/W2891699316","https://openalex.org/W2896083964","https://openalex.org/W2907410281","https://openalex.org/W2963331030","https://openalex.org/W2982350200","https://openalex.org/W2995121266","https://openalex.org/W3000441679","https://openalex.org/W3009641258","https://openalex.org/W3034289478","https://openalex.org/W3036847733","https://openalex.org/W3039166530","https://openalex.org/W3048094199","https://openalex.org/W3048145331","https://openalex.org/W3080382294","https://openalex.org/W3080499510","https://openalex.org/W3103998378","https://openalex.org/W3104141960","https://openalex.org/W3128959222","https://openalex.org/W3138207087","https://openalex.org/W4213287504","https://openalex.org/W4220973759","https://openalex.org/W4224284455","https://openalex.org/W4226145349","https://openalex.org/W4241511027","https://openalex.org/W4247692230","https://openalex.org/W4247765142","https://openalex.org/W4286374021","https://openalex.org/W4290189322","https://openalex.org/W4294206371","https://openalex.org/W4386470164","https://openalex.org/W6651418722","https://openalex.org/W6746066165","https://openalex.org/W6749432222","https://openalex.org/W6760626527","https://openalex.org/W6767323259","https://openalex.org/W6800533711","https://openalex.org/W6809405232","https://openalex.org/W6810472431","https://openalex.org/W6810786694","https://openalex.org/W6814825230"],"related_works":["https://openalex.org/W2582981600","https://openalex.org/W4387467152","https://openalex.org/W4253989935","https://openalex.org/W2066354466","https://openalex.org/W4379115910","https://openalex.org/W3010413952","https://openalex.org/W2810560948","https://openalex.org/W2070793896","https://openalex.org/W2020816142","https://openalex.org/W2000428801"],"abstract_inverted_index":{"The":[0,167,196],"connectivity":[1],"and":[2,43,64,105,118,147,162,177,215,232,264,269],"resource-constrained":[3],"nature":[4],"of":[5,16,21,29,124,174,207],"single-board":[6,96,138,160],"devices":[7,32,78,97,161,238],"open":[8],"the":[9,22,27,122,134,164,170,175,181,234,245,252,259],"door":[10],"to":[11,35,73,157,188],"cybersecurity":[12],"concerns":[13],"affecting":[14],"Internet":[15],"Things":[17],"(IoT)":[18],"scenarios.":[19,60],"One":[20],"most":[23],"important":[24,266],"issues":[25],"is":[26,69],"presence":[28],"unauthorized":[30],"IoT":[31,59],"that":[33,191],"want":[34],"impersonate":[36],"legitimate":[37],"ones":[38],"by":[39,79,85,239],"using":[40],"identical":[41,159,209],"hardware":[42,104],"software":[44,106],"specifications.":[45],"This":[46],"situation":[47],"can":[48],"provoke":[49],"sensitive":[50],"information":[51],"leakages,":[52],"data":[53],"poisoning,":[54],"or":[55,115],"privilege":[56],"escalation":[57],"in":[58,87,193,202,244],"Combining":[61],"behavioral":[62,155],"fingerprinting":[63,156],"Machine/Deep":[65],"Learning":[66],"(ML/DL)":[67],"techniques":[68],"a":[70,150,203,224,241,249],"promising":[71],"approach":[72],"identify":[74,158],"these":[75],"malicious":[76],"spoofing":[77],"detecting":[80],"minor":[81],"performance":[82],"differences":[83],"generated":[84],"imperfections":[86],"manufacturing.":[88],"However,":[89],"existing":[90],"solutions":[91],"are":[92],"not":[93,101,120,262],"suitable":[94],"for":[95,137,236],"since":[98],"they":[99],"do":[100,119],"consider":[102],"their":[103],"limitations,":[107],"underestimate":[108],"critical":[109],"aspects":[110],"such":[111],"as":[112],"fingerprint":[113,260],"stability":[114],"context":[116],"changes,":[117],"explore":[121],"potential":[123],"ML/DL":[125,178],"techniques.":[126],"To":[127],"improve":[128],"it,":[129],"this":[130],"work":[131],"first":[132],"identifies":[133],"essential":[135],"properties":[136,261],"device":[139,182],"identification:":[140],"uniqueness,":[141],"stability,":[142],"diversity,":[143],"scalability,":[144],"efficiency,":[145],"robustness,":[146],"security.":[148],"Then,":[149],"novel":[151],"methodology":[152,168,197],"relies":[153],"on":[154],"meet":[163],"previous":[165],"properties.":[166],"leverages":[169],"different":[171],"built-in":[172],"components":[173],"system":[176],"techniques,":[179],"comparing":[180],"internal":[183],"behavior":[184],"with":[185,228,255],"each":[186],"other":[187],"detect":[189],"variations":[190],"occurred":[192],"manufacturing":[194],"processes.":[195],"validation":[198],"has":[199],"been":[200],"performed":[201],"real":[204],"environment":[205],"composed":[206],"15":[208],"Raspberry":[210,217],"Pi":[211,218],"4":[212],"Model":[213,220],"B":[214],"10":[216],"3":[219],"B\uff0b":[221],"devices,":[222],"obtaining":[223],"91.9%":[225],"average":[226],"TPR":[227],"an":[229],"XGBoost":[230],"model":[231],"achieving":[233],"identification":[235],"all":[237],"setting":[240],"50%":[242],"threshold":[243],"evaluation":[246],"process.":[247],"Finally,":[248],"discussion":[250],"compares":[251],"proposed":[253],"solution":[254],"related":[256],"work,":[257],"highlighting":[258],"met,":[263],"provides":[265],"lessons":[267],"learned":[268],"limitations.":[270]},"counts_by_year":[{"year":2026,"cited_by_count":3},{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":6}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2023-01-06T00:00:00"}
