Skip to main content

Modeling and Analysis of IoT Energy Resource Exhaustion Attacks

  • Chapter
  • First Online:
Intelligent Distributed Computing XI (IDC 2017)

Part of the book series: Studies in Computational Intelligence ((SCI,volume 737))

Included in the following conference series:

Abstract

Subjection of wireless Internet of Things (IoT) devices to energy resource exhaustion attacks gets increasing importance. Being stealthy enough for an attack target and systems of its monitoring such attacks are capable to exhaust energy of the device in a relatively short period and thereby impair the function and availability of the device. The paper analyzes possible types of ERE attacks, proposes an intruder model regarding this kind of attacks and provides experimental studies on the basis of a developed use case.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Goudar, C.P., Kulkarni, S.S.: Mechanisms for detecting and preventing denial of sleep attacks and strengthening signals in wireless sensor networks. Int. J. Emerg. Res. Manag. Technol. 4(6) (2015)

    Google Scholar 

  2. Racic, R., Chen, D.M., Chen H.: Exploiting MMS vulnerabilities to stealthily exhaust mobile phone’s battery. In: 2006 Securecomm and Workshops, pp. 1–10 (2006)

    Google Scholar 

  3. Moyers, B.R., Dunning, J.P., Marchany, R.C., Tront J.G.: Effects of Wi-Fi and bluetooth battery exhaustion attacks on mobile devices. In: 43rd Hawaii International Conference on System Sciences, pp. 1–9 (2010)

    Google Scholar 

  4. Buennemeyer, T.K., Gora, M., Marchany R.C., Tront, J.G.: Battery exhaustion attack detection with small handheld mobile computers. In: IEEE International Conference on Portable Information Devices, pp. 1–5 (2007)

    Google Scholar 

  5. Boubiche, D.E., Bilami, A.: A defense strategy against energy exhausting attacks in wireless sensor networks. J. Emerg. Technol. Web Intel. 5(1) (2013)

    Google Scholar 

  6. Karpagam, R., Archana, P.: Prevention of selective jamming attacks using swarm intelligence packet-hiding methods. Int. J. Eng. Comput. Sci. 2, 2774–2778 (2013)

    Google Scholar 

  7. Periyanayagi, S., Sumathy, V., Kulandaivel, R.: A defense technique for jamming attacks in wireless sensor networks based on sensor networks. In: International Conference on Process Automation, Control and Computing, pp. 1–5 (2011)

    Google Scholar 

  8. Capossele, A.T., Cervo, V., Petrioli, C., Spenza, D.: Counteracting denial-of-sleep attacks in wake-up-radio-based sensing systems. In: 13th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON), pp. 1–9 (2016)

    Google Scholar 

  9. Farzana, T., Babu, A.: A light weight PLGP based method for mitigating vampire attacks in wireless sensor networks. Int. J. Eng. Comput. Sci. 3(7) (2014)

    Google Scholar 

  10. Rae, A.J., Wildman, L.P.: A taxonomy of attacks on secure devices. In: Australian Information Warfare and IT Security, pp. 251–264 (2003)

    Google Scholar 

  11. Abraham, D.G., Dolan, G.M., Double, G.P., Stevens, J.V.: Transaction security system. IBM Syst. J. 30(2), 206–228 (1991)

    Article  Google Scholar 

  12. Desnitsky, V., Kotenko, I., Chechulin, A.: Configuration-based approach to embedded device security. In: Lecture Notes in Computer Science, vol. 7531, pp. 270–285. Springer (2012)

    Google Scholar 

  13. Desnitsky, V., Levshun, D., Chechulin, A., Kotenko, I.: Design technique for secure embedded devices: application for creation of integrated cyber-physical security system. J. Wireless Mob. Netw. Ubiquitous Comput. Dependable Appl. (JoWUA) 7(2), 60–80 (2016)

    Google Scholar 

Download references

Acknowledgements

The work is supported by RSF #15-11-30029 in SPIIRAS.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Igor Kotenko .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG

About this chapter

Cite this chapter

Desnitsky, V., Kotenko, I. (2018). Modeling and Analysis of IoT Energy Resource Exhaustion Attacks. In: Ivanović, M., Bădică, C., Dix, J., Jovanović, Z., Malgeri, M., Savić, M. (eds) Intelligent Distributed Computing XI. IDC 2017. Studies in Computational Intelligence, vol 737. Springer, Cham. https://doi.org/10.1007/978-3-319-66379-1_23

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-66379-1_23

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-66378-4

  • Online ISBN: 978-3-319-66379-1

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics