Skip to main content

A Denial of Service Attack Method for IoT System in Photovoltaic Energy System

  • Conference paper
  • First Online:
Network and System Security (NSS 2017)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 10394))

Included in the following conference series:

Abstract

The development of renewable energy system solve air pollution problems. Photovoltic (PV) energy system is one of widely used renewable energy system. The emergence of Internet of Tings (IoT) make the effective monitoring possible. In order to analyze potential threat of IoT in PV energy system, this paper shows DoS attack methods to nRF24l01 based IoT. The analysis of DoS attack will help the developers to find flaws in the IoT system.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Edenhofer, O., Madruga, R.P., Sokona, Y., et al.: Renewable Energy Sources and Climate Change Mitigation: Special Report of the Intergovernmental Panel on Climate Change, pp. 1–1075. Cambridge University Press, Cambridge (2012)

    Google Scholar 

  2. Qamar, S.B., Janajreh, I.: Renewable energy sources for isolated self-sufficient microgrids: comparison of solar and wind energy for UAE. Energy Procedia 103, 413–418 (2016)

    Article  Google Scholar 

  3. Abed, K., Bahgat, A., Badr, M., El-Bayoumi, M., Ragheb, A.: Experimental results of computer monitoring of PV-based energy system. In: Sayigh, A. (ed.) Renewable Energy in the Service of Mankind Vol II, pp. 415–427. Springer, Cham (2016). doi:10.1007/978-3-319-18215-5_37

    Chapter  Google Scholar 

  4. Jana, J., Adhya, S., Saha, D.K., et al.: An IoT based smart solar photovoltaic remote monitoring and control unit. In: International Conference on Control, Instrumentation, Energy & Communication (2016)

    Google Scholar 

  5. De-Liang, S.I., Dong-Ting, Q.I., Zhang, W.H., et al.: PV power station of SCADA system based on IOT. Renewable Energy Resources (2012)

    Google Scholar 

  6. Cam-Winget, N., Sadeghi, A.R., Jin, Y.: Invited - Can IoT be secured: emerging challenges in connecting the unconnected. In: Design Automation Conference, p. 122. ACM (2016)

    Google Scholar 

  7. Chang, C., Zhu, C., Wang, H., Pei, C.: Survivability evaluation of cluster-based wireless sensor network under DoS attack. In: Wang, Y., Zhang, X. (eds.) IOT 2012. CCIS, vol. 312, pp. 126–132. Springer, Heidelberg (2012). doi:10.1007/978-3-642-32427-7_18

    Chapter  Google Scholar 

  8. Wang, J.P., Huang, T., Qi-Yue, L.I., et al.: Architecture and protocol stack design for new wireless IOT network. Control & Instruments in Chemical Industry (2016)

    Google Scholar 

  9. Hu, J., Ma, Z., Sun, C.: Energy-efficient MAC protocol designed for wireless sensor network for IoT. In: International Conference on Computational Intelligence and Security, CIS 2011, Sanya, Hainan, China, pp. 721–725. DBLP, December 2011

    Google Scholar 

  10. Liang, C.W., Hsu, Y.J., Lin, K.J.: Auction-based resource access protocols in IoT service systems. In: IEEE International Conference on Service-Oriented Computing and Applications, pp. 49–56. IEEE (2014)

    Google Scholar 

  11. Liu, Z., Xi, B., Yuan, Y.: Analysis on IOT communication protocol. In: International Conference on Information and Automation, pp. 126–130. IEEE (2012)

    Google Scholar 

  12. Aziz, B.: A formal model and analysis of an IoT protocol. Ad Hoc Netw. 36(P1), 49–57 (2015)

    Google Scholar 

  13. Rahman, R.A., Shah, B.: Security analysis of IoT protocols: a focus in CoAP. In: Mec International Conference on Big Data and Smart City, pp. 1–7. IEEE (2016)

    Google Scholar 

  14. Alanazi, S., Al-Muhtadi, J., Derhab, A., et al.: On resilience of wireless mesh routing protocol against DoS attacks in IoT-based ambient assisted living applications. In: International Conference on E-Health Networking, Application & Services, pp. 205–210 (2015)

    Google Scholar 

  15. Zhang, C., Green, R.: Communication security in internet of thing: preventive measure and avoid DDoS attack over IoT network. In: Symposium on Communications & NETWORKING, pp. 8–15. Society for Computer Simulation International (2015)

    Google Scholar 

  16. Cusack, B., Tian, Z., Kyaw, A.K.: Identifying DOS and DDOS Attack Origin: IP Traceback Methods Comparison and Evaluation for IoT (2016)

    Google Scholar 

  17. Ruan, N., Hori, Y.: DoS attack-tolerant TESLA-based broadcast authentication protocol in Internet of Things. In: 2012 International Conference on Selected Topics in Mobile and Wireless Networking (iCOST), pp. 60–65. IEEE (2012)

    Google Scholar 

  18. Lulu, L., Kai, Z., Qiankun, S., Xin, H.: A denial of service attack methods for an IoT system. Accepted by 8th International Conference on IT in Medicine and Education, Fuzhou (2016)

    Google Scholar 

  19. Cong, B., Xingren, G., Qiankun, S., Kai, Z., Xin, H.: A tool for denial of service attack testing in IoT. Accepted by the 1st Conference on Emerging Topics in Interactive Systems, Suzhou (2016)

    Google Scholar 

Download references

Acknowledgement

This work was supported in part by the Natural Science Foundation of China under Grant No. 61401517, in part by the National High Technology Research and Development Program (“863” Program) of China under Grant No. 2015AA016001.

This work has been supported by the XJTLU research development fund projects RDF140243 and RDF150246, as well as by the Suzhou Science and Technology Development Plan under grant SYG201516, and Jiangsu Province National Science Foundation under grant BK20150376.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Kai Zheng .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Liang, L., Zheng, K., Sheng, Q., Wang, W., Fu, R., Huang, X. (2017). A Denial of Service Attack Method for IoT System in Photovoltaic Energy System. In: Yan, Z., Molva, R., Mazurczyk, W., Kantola, R. (eds) Network and System Security. NSS 2017. Lecture Notes in Computer Science(), vol 10394. Springer, Cham. https://doi.org/10.1007/978-3-319-64701-2_48

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-64701-2_48

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-64700-5

  • Online ISBN: 978-3-319-64701-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics