Depletion-of-Battery Attack: Specificity, Modelling and Analysis

被引:31
作者
Shakhov, Vladimir [1 ]
Koo, Insoo [2 ]
机构
[1] Univ Ulsan, Automobile Ship Elect Convergence Ctr, Ulsan 680749, South Korea
[2] Univ Ulsan, Sch Elect Engn, Ulsan 680749, South Korea
基金
新加坡国家研究基金会;
关键词
wireless sensor networks; security; depletion-of-battery attack; WIRELESS SENSOR NETWORKS; LIFETIME; CONSUMPTION; SCHEME; POWER; HOME;
D O I
10.3390/s18061849
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
The emerging Internet of Things (IoT) has great potential; however, the societal costs of the IoT can outweigh its benefits. To unlock IoT potential, there needs to be improvement in the security of IoT applications. There are several standardization initiatives for sensor networks, which eventually converge with the Internet of Things. As sensor-based applications are deployed, security emerges as an essential requirement. One of the critical issues of wireless sensor technology is limited sensor resources, including sensor batteries. This creates a vulnerability to battery-exhausting attacks. Rapid exhaustion of sensor battery power is not only explained by intrusions, but can also be due to random failure of embedded sensor protocols. Thus, most wireless sensor applications, without tools to defend against rash battery exhausting, would be unable to function during prescribed times. In this paper, we consider a special type of threat, in which the harm is malicious depletion of sensor battery power. In contrast to the traditional denial-of-service attack, quality of service under the considered attack is not necessarily degraded. Moreover, the quality of service can increase up to the moment of the sensor set crashes. We argue that this is a distinguishing type of attack. Hence, the application of a traditional defense mechanism against this threat is not always possible. Therefore, effective methods should be developed to counter the threat. We first discuss the feasibility of rash depletion of battery power. Next, we propose a model for evaluation of energy consumption when under attack. Finally, a technique to counter the attack is discussed.
引用
收藏
页数:20
相关论文
共 60 条
[1]   Wireless sensor networks: a survey [J].
Akyildiz, IF ;
Su, W ;
Sankarasubramaniam, Y ;
Cayirci, E .
COMPUTER NETWORKS, 2002, 38 (04) :393-422
[2]  
[Anonymous], 2017, CRYPTOGRAPHY-BASEL, DOI DOI 10.3390/CRYPTOGRAPHY1010004
[3]   Low-Power Wireless Sensor Nodes for Ubiquitous Long-Term Biomedical Signal Monitoring [J].
Bachmann, Christian ;
Ashouei, Maryam ;
Pop, Valer ;
Vidojkovic, Maja ;
de Groot, Harmke ;
Gyselinckx, Bert .
IEEE COMMUNICATIONS MAGAZINE, 2012, 50 (01) :20-27
[4]   On Balancing Energy Consumption in Wireless Sensor Networks [J].
Bouabdallah, Fatma ;
Bouabdallah, Nizar ;
Boutaba, Raouf .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2009, 58 (06) :2909-2924
[5]   Wireless sensor network denial of sleep attack [J].
Brownfield, M ;
Gupta, Y ;
Davis, N .
PROCEEDINGS FROM THE SIXTH ANNUAL IEEE SYSTEMS, MAN AND CYBERNETICS INFORMATION ASSURANCE WORKSHOP, 2005, :356-364
[6]   An Intelligent Self-Adjusting Sensor for Smart Home Services based on ZigBee Communications [J].
Byun, Jinsung ;
Jeon, Boungju ;
Noh, Junyoung ;
Kim, Youngil ;
Park, Sehyun .
IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2012, 58 (03) :794-802
[7]  
Capossele A. T., 2016, P 13 ANN IEEE INT C, P1, DOI DOI 10.1109/SAHCN.2016.7732978
[8]   Harnessing Battery Recovery Effect in Wireless Sensor Networks: Experiments and Analysis [J].
Chau, Chi-Kin ;
Qin, Fei ;
Sayed, Samir ;
Wahab, Muhammad Husni ;
Yang, Yang .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2010, 28 (07) :1222-1232
[9]   Sensor Network Security: A Survey [J].
Chen, Xiangqian ;
Makki, Kia ;
Yen, Kang ;
Pissinou, Niki .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2009, 11 (02) :52-73
[10]   An Energy-Aware Scheduling Scheme for Wireless Sensor Networks [J].
Cheng, Chi-Tsun ;
Tse, Chi K. ;
Lau, Francis C. M. .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2010, 59 (07) :3427-3444