|The tamper detection design can be implemented to sense different types, techniques, and sophistication of tampering, depending on the perceived threats and risks. The methods used for tamper detection are typically designed as a suite of sensors each specialized on a single threat type, some of which may be physical penetration, hot or cold temperature extremes, input voltage variations, input frequency variations, x-rays, and gamma rays.
Examples of techniques used to detect tampering may include any or all of the following: switches to detect the opening of doors or access covers, etc. Many IoT devices use WiFi for communication and Channel State Information (CSI) based tamper detection is a valid option. Each 802.11n WiFi frame contains a preamble allows a receiver to estimate the impact of the wireless channel, the transmitter and the receiver on the signal. The estimation result - the CSI - is used by a receiver to extract the transmitted information. However, as the CSI depends on the communication environment and the transmitter hardware, it can be used as well for security purposes. It is through this channel that IoT can be utilized to prevent device tampering.
The utility of this technology goes without saying; preventing the theft or damage of assets is obviously critical, and businesses should take appropriate steps to ensure that their assets remain is good condition.
-OT CAPEX Reduction
-IT CAPEX Reduction