Denial-of-service attacks on battery-powered mobile computers

被引:77
作者
Martin, T
Hsiao, M
Ha, D
Krishnaswami, J
机构
来源
SECOND IEEE ANNUAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS, PROCEEDINGS | 2004年
关键词
D O I
10.1109/PERCOM.2004.1276868
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Sleep deprivation attacks are a form of denial of service attack whereby an attacker renders a pervasive computing device inoperable by draining the battery more quickly than it would be drained under normal usage. We describe three main methods for an attacker to drain the battery: (1) Service request power attacks, where repeated requests are made to the victim for services, typically over a network--even if the service is not provided the victim must expend energy deciding whether or not to honor the request,(2) benign power attacks, where the victim is made to execute a valid but energy-hungry task repeatedly, and (3) malignant power attacks, where the attacker modifies or creates an executable to make the system consume more energy than it would otherwise. Our initial results demonstrate the increased power consumption due to these attacks, which we believe are the first real examples of these attacks to appear in the literature. We also propose a power-secure architecture to thwart these power attacks by employing multi-level authentication and energy signatures.
引用
收藏
页码:309 / 318
页数:10
相关论文
共 23 条
[1]   PowerScope: A tool for profiling the energy usage of mobile applications [J].
Flinn, J ;
Satyanarayanan, M .
WMCSA '99, SECOND IEEE WORKSHOP ON MOBILE COMPUTING SYSTEMS AND APPLICATIONS, PROCEEDINGS, 1999, :2-10
[2]   Peak power estimation using genetic spot optimization for large VLSI circuits [J].
Hsiao, MS .
DESIGN, AUTOMATION AND TEST IN EUROPE CONFERENCE AND EXHIBITION 1999, PROCEEDINGS, 1999, :175-179
[3]  
*INT CORP, ACPI WEB SIT
[4]  
*ITU T, 1993, X509 ITUT
[5]   Energy trade-offs in the IBM wristwatch computer [J].
Kamijoh, N ;
Inoue, T ;
Olsen, CM ;
Raghunath, MT ;
Narayanaswami, C .
FIFTH INTERNATIONAL SYMPOSIUM ON WEARABLE COMPUTERS, PROCEEDINGS, 2001, :133-140
[6]  
Kocher P., 1999, Advances in Cryptology - CRYPTO'99. 19th Annual International Cryptology Conference. Proceedings, P388
[7]  
KOHL JT, 1994, DISTRIBUTED OPEN SYS
[8]  
KRIPLANI H, 1993, ACM IEEE D, P384
[9]  
Linden D., 1995, HDB BATTERIES, DOI DOI 10.5860/CHOICE.33-2144
[10]   Maximizing the weighted switching activity in combinational CMOS circuits under the variable delay model. [J].
Manich, S ;
Figueras, J .
EUROPEAN DESIGN & TEST CONFERENCE - ED&TC 97, PROCEEDINGS, 1997, :597-602