**7.2 Operational phase**

*Service Robotics*

of the system and deter theft [4].

and system profiles [4].

next concepts:

needed.

stored.

validating.

features for typical sensors.

case to improve the ICMetric strength.

**7.1 Calibration phase**

ware, or environment.

the idea of stored keys and deters theft of stored keys.

the brute force, but increasing the size of the key cannot always protect the security

In order to eliminate the theft and by relying on the special features of each

ICMetric technology retains the idea of storing the key where there is no encryption key in the system; this will reduce the attackers. It uses hardware and software features of device to create ICMetric, which will be used in encryption services. There is a similarity between the biometric systems and the ICMetric, as these systems used features for identification of different persons. Similarly, ICMetric uses the characteristics of the device to identify each device uniquely and thus eliminates

ICMetrics points to a new technique that can be employed to extract features from the hardware and software environment of a system. Every device is singular in its internal environment and then the features that make every device diverse can be employed to create a unique and single number for each device. It is based on the

1.ICMetric number is not stored on the system and can be recreated when

2.If the system is attacked, there will be no theft because the ICMetric is non-

3.ICMetric number and any proceeding outcomes that are based on the ICMetric number will change if any adjusting has been done with the software, hard-

4.There is no requirement to store any template that can serve the aim of device

The generation of ICMetric system is comprised of two phases: calibration phase to collect detailed knowledge and operational phase to distribute each extracted

At this phase, the characteristics are documented and analysed, normalisation distributions are utilised on feature values noticed in the system. A device ICMetric basis number can be created by applying statistical and mathematical operations on the extracted feature values. This phase is utilised once only when the system needs the ICMetric basis number. The features on which the ICMetric is based are unique; therefore, it is difficult for the attacker to detect or generate it. This is an important

device, we can create an identification for each device, and this identification is called ICMetric. Other hardware techniques differ from the ICMetric technology in the selection of device characteristics. Traditional fingerprinting techniques depend on the characteristics that are easily exposed to capture, deception, or repetition by the attackers. ICMetric technology uses internal behaviour that increase the complexity of generated ICMetric and they are hard for an attacker to predict or spoof at runtime such as features that can be employed for creation an ICMetric are Media Access Control (MAC) addresses and serial numbers. Other features are utilised, which are application usage special task, such as browsing histories, camera resolutions, common user files,

**98**

Operational phase follows the calibration phase where the unique number is generated depending on the extracted features. The preprocessing phase can be applied to generate unique features that distinguish it from others [5]. In this phase, an effort is made to generate a resulting device ICMetric basis number through either feature concatenation or feature addition.
