Modeling and Analysis of IoT Energy Resource Exhaustion Attacks
Subjection of wireless Internet of Things (IoT) devices to energy resource exhaustion attacks gets increasing importance. Being stealthy enough for an attack target and systems of its monitoring such attacks are capable to exhaust energy of the device in a relatively short period and thereby impair the function and availability of the device. The paper analyzes possible types of ERE attacks, proposes an intruder model regarding this kind of attacks and provides experimental studies on the basis of a developed use case.
KeywordsSecurity Energy resource exhaustion IoT Modeling and analysis
The work is supported by RSF #15-11-30029 in SPIIRAS.
- 1.Goudar, C.P., Kulkarni, S.S.: Mechanisms for detecting and preventing denial of sleep attacks and strengthening signals in wireless sensor networks. Int. J. Emerg. Res. Manag. Technol. 4(6) (2015)Google Scholar
- 2.Racic, R., Chen, D.M., Chen H.: Exploiting MMS vulnerabilities to stealthily exhaust mobile phone’s battery. In: 2006 Securecomm and Workshops, pp. 1–10 (2006)Google Scholar
- 3.Moyers, B.R., Dunning, J.P., Marchany, R.C., Tront J.G.: Effects of Wi-Fi and bluetooth battery exhaustion attacks on mobile devices. In: 43rd Hawaii International Conference on System Sciences, pp. 1–9 (2010)Google Scholar
- 4.Buennemeyer, T.K., Gora, M., Marchany R.C., Tront, J.G.: Battery exhaustion attack detection with small handheld mobile computers. In: IEEE International Conference on Portable Information Devices, pp. 1–5 (2007)Google Scholar
- 5.Boubiche, D.E., Bilami, A.: A defense strategy against energy exhausting attacks in wireless sensor networks. J. Emerg. Technol. Web Intel. 5(1) (2013)Google Scholar
- 6.Karpagam, R., Archana, P.: Prevention of selective jamming attacks using swarm intelligence packet-hiding methods. Int. J. Eng. Comput. Sci. 2, 2774–2778 (2013)Google Scholar
- 7.Periyanayagi, S., Sumathy, V., Kulandaivel, R.: A defense technique for jamming attacks in wireless sensor networks based on sensor networks. In: International Conference on Process Automation, Control and Computing, pp. 1–5 (2011)Google Scholar
- 8.Capossele, A.T., Cervo, V., Petrioli, C., Spenza, D.: Counteracting denial-of-sleep attacks in wake-up-radio-based sensing systems. In: 13th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON), pp. 1–9 (2016)Google Scholar
- 9.Farzana, T., Babu, A.: A light weight PLGP based method for mitigating vampire attacks in wireless sensor networks. Int. J. Eng. Comput. Sci. 3(7) (2014)Google Scholar
- 10.Rae, A.J., Wildman, L.P.: A taxonomy of attacks on secure devices. In: Australian Information Warfare and IT Security, pp. 251–264 (2003)Google Scholar
- 12.Desnitsky, V., Kotenko, I., Chechulin, A.: Configuration-based approach to embedded device security. In: Lecture Notes in Computer Science, vol. 7531, pp. 270–285. Springer (2012)Google Scholar
- 13.Desnitsky, V., Levshun, D., Chechulin, A., Kotenko, I.: Design technique for secure embedded devices: application for creation of integrated cyber-physical security system. J. Wireless Mob. Netw. Ubiquitous Comput. Dependable Appl. (JoWUA) 7(2), 60–80 (2016)Google Scholar