Performing energy consuming attacks on IoT devices

被引:6
|
作者
Kepceoglu, Bugra [1 ]
Murzaeva, Azhar [1 ]
Demirci, Sercan [1 ]
机构
[1] Ondokuz Mayis Univ, Dept Comp Engn, TR-55200 Atakum, Samsun, Turkey
关键词
Energy consuming attacks; DOS attacks in IoT;
D O I
10.1109/telfor48224.2019.8971102
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Internet of Things (IoT) innovation brings many facilities to our lives by connecting personal computers, smart phones and other devices like dishwashers, fridges to one network. Most of these devices like sensors have limited computational power that does not allow the use of contemporary security precautions such as encryption that leads to the gap in security of IoT network. In this study Denial of Service (DoS) attacks were performed to see in which condition devices are during an attack. Our main goal is to measure energy consumption during an attack. For this, we prepared a testbed platform and observed the cpu usage of a device during the attack. Synchronization (SYN) flood attack and Internet Control Message Protocol (ICMP) flood attack were performed.
引用
收藏
页码:185 / 188
页数:4
相关论文
共 50 条
  • [21] Modeling and Analysis of IoT Energy Resource Exhaustion Attacks
    Desnitsky, Vasily
    Kotenko, Igor
    INTELLIGENT DISTRIBUTED COMPUTING XI, 2018, 737 : 263 - 270
  • [22] HARPAGON: An Energy Management Framework for Attacks in IoT Networks
    Bout, Emilie
    Loscri, Valeria
    Gallais, Antoine
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (20) : 19959 - 19970
  • [23] Access Control Attacks against IoT Smart Devices: A Case Study
    Philip, Sumesh J.
    Amisha, Fnu
    Kamesh, Fnu
    2024 INTERNATIONAL CONFERENCE ON SMART APPLICATIONS, COMMUNICATIONS AND NETWORKING, SMARTNETS-2024, 2024,
  • [24] Battery Depletion Attacks on NB-IoT Devices Using Interference
    Ionescu, Vlad
    Roedig, Utz
    COMPUTER SECURITY: ESORICS 2021 INTERNATIONAL WORKSHOPS, 2022, 13106 : 276 - 295
  • [25] Protecting RESTful IoT Devices from Battery Exhaustion DoS Attacks
    Hristozov, Stefan
    Huber, Manuel
    Sigl, Georg
    PROCEEDINGS OF THE 2020 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST), 2020, : 316 - 327
  • [26] An Application of the Khumbelo Function on the Camellia Algorithm to Prevent Attacks in IoT Devices
    Muthavhine, Khumbelo Difference
    Sumbwanyambe, Mbuyu
    IEEE ACCESS, 2023, 11 : 119959 - 119992
  • [27] Web-based Attacks to Discover and Control Local IoT Devices
    Acar, Gunes
    Huang, Danny Yuxing
    Li, Frank
    Narayanan, Arvind
    Feamster, Nick
    PROCEEDINGS OF THE 2018 WORKSHOP ON IOT SECURITY AND PRIVACY (IOT S&P '18), 2018, : 29 - 35
  • [28] Detection of DDoS Attacks on Urban IoT Devices Using Neural Networks
    Obetta, Simon Onyebuchi
    Moldovan, Arghir-Nicolae
    PROCEEDINGS OF THE 8TH INTERNATIONAL CONFERENCE ON INTERNET OF THINGS, BIG DATA AND SECURITY, IOTBDS 2023, 2023, : 236 - 242
  • [29] Threat models for vulnerability analysis of IoT devices for Manipulation of Demand attacks
    Font, Jose Antonio
    Jarauta, Javier
    Gesteira, Roberto
    Palacios, Rafael
    Lopez, Gregorio
    2023 JNIC CYBERSECURITY CONFERENCE, JNIC, 2023,
  • [30] Malware Evasion Attacks Against IoT and Other Devices: An Empirical Study
    Xu, Yan
    Li, Deqiang
    Li, Qianmu
    Xu, Shouhuai
    TSINGHUA SCIENCE AND TECHNOLOGY, 2024, 29 (01): : 127 - 142