Abstract
The development of renewable energy system solve air pollution problems. Photovoltic (PV) energy system is one of widely used renewable energy system. The emergence of Internet of Tings (IoT) make the effective monitoring possible. In order to analyze potential threat of IoT in PV energy system, this paper shows DoS attack methods to nRF24l01 based IoT. The analysis of DoS attack will help the developers to find flaws in the IoT system.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Edenhofer, O., Madruga, R.P., Sokona, Y., et al.: Renewable Energy Sources and Climate Change Mitigation: Special Report of the Intergovernmental Panel on Climate Change, pp. 1–1075. Cambridge University Press, Cambridge (2012)
Qamar, S.B., Janajreh, I.: Renewable energy sources for isolated self-sufficient microgrids: comparison of solar and wind energy for UAE. Energy Procedia 103, 413–418 (2016)
Abed, K., Bahgat, A., Badr, M., El-Bayoumi, M., Ragheb, A.: Experimental results of computer monitoring of PV-based energy system. In: Sayigh, A. (ed.) Renewable Energy in the Service of Mankind Vol II, pp. 415–427. Springer, Cham (2016). doi:10.1007/978-3-319-18215-5_37
Jana, J., Adhya, S., Saha, D.K., et al.: An IoT based smart solar photovoltaic remote monitoring and control unit. In: International Conference on Control, Instrumentation, Energy & Communication (2016)
De-Liang, S.I., Dong-Ting, Q.I., Zhang, W.H., et al.: PV power station of SCADA system based on IOT. Renewable Energy Resources (2012)
Cam-Winget, N., Sadeghi, A.R., Jin, Y.: Invited - Can IoT be secured: emerging challenges in connecting the unconnected. In: Design Automation Conference, p. 122. ACM (2016)
Chang, C., Zhu, C., Wang, H., Pei, C.: Survivability evaluation of cluster-based wireless sensor network under DoS attack. In: Wang, Y., Zhang, X. (eds.) IOT 2012. CCIS, vol. 312, pp. 126–132. Springer, Heidelberg (2012). doi:10.1007/978-3-642-32427-7_18
Wang, J.P., Huang, T., Qi-Yue, L.I., et al.: Architecture and protocol stack design for new wireless IOT network. Control & Instruments in Chemical Industry (2016)
Hu, J., Ma, Z., Sun, C.: Energy-efficient MAC protocol designed for wireless sensor network for IoT. In: International Conference on Computational Intelligence and Security, CIS 2011, Sanya, Hainan, China, pp. 721–725. DBLP, December 2011
Liang, C.W., Hsu, Y.J., Lin, K.J.: Auction-based resource access protocols in IoT service systems. In: IEEE International Conference on Service-Oriented Computing and Applications, pp. 49–56. IEEE (2014)
Liu, Z., Xi, B., Yuan, Y.: Analysis on IOT communication protocol. In: International Conference on Information and Automation, pp. 126–130. IEEE (2012)
Aziz, B.: A formal model and analysis of an IoT protocol. Ad Hoc Netw. 36(P1), 49–57 (2015)
Rahman, R.A., Shah, B.: Security analysis of IoT protocols: a focus in CoAP. In: Mec International Conference on Big Data and Smart City, pp. 1–7. IEEE (2016)
Alanazi, S., Al-Muhtadi, J., Derhab, A., et al.: On resilience of wireless mesh routing protocol against DoS attacks in IoT-based ambient assisted living applications. In: International Conference on E-Health Networking, Application & Services, pp. 205–210 (2015)
Zhang, C., Green, R.: Communication security in internet of thing: preventive measure and avoid DDoS attack over IoT network. In: Symposium on Communications & NETWORKING, pp. 8–15. Society for Computer Simulation International (2015)
Cusack, B., Tian, Z., Kyaw, A.K.: Identifying DOS and DDOS Attack Origin: IP Traceback Methods Comparison and Evaluation for IoT (2016)
Ruan, N., Hori, Y.: DoS attack-tolerant TESLA-based broadcast authentication protocol in Internet of Things. In: 2012 International Conference on Selected Topics in Mobile and Wireless Networking (iCOST), pp. 60–65. IEEE (2012)
Lulu, L., Kai, Z., Qiankun, S., Xin, H.: A denial of service attack methods for an IoT system. Accepted by 8th International Conference on IT in Medicine and Education, Fuzhou (2016)
Cong, B., Xingren, G., Qiankun, S., Kai, Z., Xin, H.: A tool for denial of service attack testing in IoT. Accepted by the 1st Conference on Emerging Topics in Interactive Systems, Suzhou (2016)
Acknowledgement
This work was supported in part by the Natural Science Foundation of China under Grant No. 61401517, in part by the National High Technology Research and Development Program (“863” Program) of China under Grant No. 2015AA016001.
This work has been supported by the XJTLU research development fund projects RDF140243 and RDF150246, as well as by the Suzhou Science and Technology Development Plan under grant SYG201516, and Jiangsu Province National Science Foundation under grant BK20150376.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Liang, L., Zheng, K., Sheng, Q., Wang, W., Fu, R., Huang, X. (2017). A Denial of Service Attack Method for IoT System in Photovoltaic Energy System. In: Yan, Z., Molva, R., Mazurczyk, W., Kantola, R. (eds) Network and System Security. NSS 2017. Lecture Notes in Computer Science(), vol 10394. Springer, Cham. https://doi.org/10.1007/978-3-319-64701-2_48
Download citation
DOI: https://doi.org/10.1007/978-3-319-64701-2_48
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-64700-5
Online ISBN: 978-3-319-64701-2
eBook Packages: Computer ScienceComputer Science (R0)