Modeling and Analysis of IoT Energy Resource Exhaustion Attacks

  • Vasily Desnitsky
  • Igor Kotenko
Part of the Studies in Computational Intelligence book series (SCI, volume 737)


Subjection of wireless Internet of Things (IoT) devices to energy resource exhaustion attacks gets increasing importance. Being stealthy enough for an attack target and systems of its monitoring such attacks are capable to exhaust energy of the device in a relatively short period and thereby impair the function and availability of the device. The paper analyzes possible types of ERE attacks, proposes an intruder model regarding this kind of attacks and provides experimental studies on the basis of a developed use case.


Security Energy resource exhaustion IoT Modeling and analysis 



The work is supported by RSF #15-11-30029 in SPIIRAS.


  1. 1.
    Goudar, C.P., Kulkarni, S.S.: Mechanisms for detecting and preventing denial of sleep attacks and strengthening signals in wireless sensor networks. Int. J. Emerg. Res. Manag. Technol. 4(6) (2015)Google Scholar
  2. 2.
    Racic, R., Chen, D.M., Chen H.: Exploiting MMS vulnerabilities to stealthily exhaust mobile phone’s battery. In: 2006 Securecomm and Workshops, pp. 1–10 (2006)Google Scholar
  3. 3.
    Moyers, B.R., Dunning, J.P., Marchany, R.C., Tront J.G.: Effects of Wi-Fi and bluetooth battery exhaustion attacks on mobile devices. In: 43rd Hawaii International Conference on System Sciences, pp. 1–9 (2010)Google Scholar
  4. 4.
    Buennemeyer, T.K., Gora, M., Marchany R.C., Tront, J.G.: Battery exhaustion attack detection with small handheld mobile computers. In: IEEE International Conference on Portable Information Devices, pp. 1–5 (2007)Google Scholar
  5. 5.
    Boubiche, D.E., Bilami, A.: A defense strategy against energy exhausting attacks in wireless sensor networks. J. Emerg. Technol. Web Intel. 5(1) (2013)Google Scholar
  6. 6.
    Karpagam, R., Archana, P.: Prevention of selective jamming attacks using swarm intelligence packet-hiding methods. Int. J. Eng. Comput. Sci. 2, 2774–2778 (2013)Google Scholar
  7. 7.
    Periyanayagi, S., Sumathy, V., Kulandaivel, R.: A defense technique for jamming attacks in wireless sensor networks based on sensor networks. In: International Conference on Process Automation, Control and Computing, pp. 1–5 (2011)Google Scholar
  8. 8.
    Capossele, A.T., Cervo, V., Petrioli, C., Spenza, D.: Counteracting denial-of-sleep attacks in wake-up-radio-based sensing systems. In: 13th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON), pp. 1–9 (2016)Google Scholar
  9. 9.
    Farzana, T., Babu, A.: A light weight PLGP based method for mitigating vampire attacks in wireless sensor networks. Int. J. Eng. Comput. Sci. 3(7) (2014)Google Scholar
  10. 10.
    Rae, A.J., Wildman, L.P.: A taxonomy of attacks on secure devices. In: Australian Information Warfare and IT Security, pp. 251–264 (2003)Google Scholar
  11. 11.
    Abraham, D.G., Dolan, G.M., Double, G.P., Stevens, J.V.: Transaction security system. IBM Syst. J. 30(2), 206–228 (1991)CrossRefGoogle Scholar
  12. 12.
    Desnitsky, V., Kotenko, I., Chechulin, A.: Configuration-based approach to embedded device security. In: Lecture Notes in Computer Science, vol. 7531, pp. 270–285. Springer (2012)Google Scholar
  13. 13.
    Desnitsky, V., Levshun, D., Chechulin, A., Kotenko, I.: Design technique for secure embedded devices: application for creation of integrated cyber-physical security system. J. Wireless Mob. Netw. Ubiquitous Comput. Dependable Appl. (JoWUA) 7(2), 60–80 (2016)Google Scholar

Copyright information

© Springer International Publishing AG 2018

Authors and Affiliations

  1. 1.St. Petersburg Institute for Informatics and Automation of the Russian Academy of SciencesSt. PetersburgRussia
  2. 2.St. Petersburg National Research University of Information Technologies, Mechanics and Optics, (ITMO University)St. PetersburgRussia

Personalised recommendations