Depletion-of-Battery Attack: Specificity, Modelling and Analysis
The emerging Internet of Things (IoT) has great potential; however, the societal costs of the IoT can outweigh its benefits. To unlock IoT potential, there needs to be improvement in the security of IoT applications. There are several standardization initiatives for sensor networks, which eventually...
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2018-06-01
|
Series: | Sensors |
Subjects: | |
Online Access: | http://www.mdpi.com/1424-8220/18/6/1849 |
_version_ | 1798039758405894144 |
---|---|
author | Vladimir Shakhov Insoo Koo |
author_facet | Vladimir Shakhov Insoo Koo |
author_sort | Vladimir Shakhov |
collection | DOAJ |
description | The emerging Internet of Things (IoT) has great potential; however, the societal costs of the IoT can outweigh its benefits. To unlock IoT potential, there needs to be improvement in the security of IoT applications. There are several standardization initiatives for sensor networks, which eventually converge with the Internet of Things. As sensor-based applications are deployed, security emerges as an essential requirement. One of the critical issues of wireless sensor technology is limited sensor resources, including sensor batteries. This creates a vulnerability to battery-exhausting attacks. Rapid exhaustion of sensor battery power is not only explained by intrusions, but can also be due to random failure of embedded sensor protocols. Thus, most wireless sensor applications, without tools to defend against rash battery exhausting, would be unable to function during prescribed times. In this paper, we consider a special type of threat, in which the harm is malicious depletion of sensor battery power. In contrast to the traditional denial-of-service attack, quality of service under the considered attack is not necessarily degraded. Moreover, the quality of service can increase up to the moment of the sensor set crashes. We argue that this is a distinguishing type of attack. Hence, the application of a traditional defense mechanism against this threat is not always possible. Therefore, effective methods should be developed to counter the threat. We first discuss the feasibility of rash depletion of battery power. Next, we propose a model for evaluation of energy consumption when under attack. Finally, a technique to counter the attack is discussed. |
first_indexed | 2024-04-11T21:58:10Z |
format | Article |
id | doaj.art-ff240533b7224cc1b99a9e9497c7d64b |
institution | Directory Open Access Journal |
issn | 1424-8220 |
language | English |
last_indexed | 2024-04-11T21:58:10Z |
publishDate | 2018-06-01 |
publisher | MDPI AG |
record_format | Article |
series | Sensors |
spelling | doaj.art-ff240533b7224cc1b99a9e9497c7d64b2022-12-22T04:01:02ZengMDPI AGSensors1424-82202018-06-01186184910.3390/s18061849s18061849Depletion-of-Battery Attack: Specificity, Modelling and AnalysisVladimir Shakhov0Insoo Koo1Automobile/Ship Electronics Convergence Center, University of Ulsan, Ulsan 680-749, KoreaThe School of Electrical Engineering, University of Ulsan, Ulsan 680-749, KoreaThe emerging Internet of Things (IoT) has great potential; however, the societal costs of the IoT can outweigh its benefits. To unlock IoT potential, there needs to be improvement in the security of IoT applications. There are several standardization initiatives for sensor networks, which eventually converge with the Internet of Things. As sensor-based applications are deployed, security emerges as an essential requirement. One of the critical issues of wireless sensor technology is limited sensor resources, including sensor batteries. This creates a vulnerability to battery-exhausting attacks. Rapid exhaustion of sensor battery power is not only explained by intrusions, but can also be due to random failure of embedded sensor protocols. Thus, most wireless sensor applications, without tools to defend against rash battery exhausting, would be unable to function during prescribed times. In this paper, we consider a special type of threat, in which the harm is malicious depletion of sensor battery power. In contrast to the traditional denial-of-service attack, quality of service under the considered attack is not necessarily degraded. Moreover, the quality of service can increase up to the moment of the sensor set crashes. We argue that this is a distinguishing type of attack. Hence, the application of a traditional defense mechanism against this threat is not always possible. Therefore, effective methods should be developed to counter the threat. We first discuss the feasibility of rash depletion of battery power. Next, we propose a model for evaluation of energy consumption when under attack. Finally, a technique to counter the attack is discussed.http://www.mdpi.com/1424-8220/18/6/1849wireless sensor networkssecuritydepletion-of-battery attack |
spellingShingle | Vladimir Shakhov Insoo Koo Depletion-of-Battery Attack: Specificity, Modelling and Analysis Sensors wireless sensor networks security depletion-of-battery attack |
title | Depletion-of-Battery Attack: Specificity, Modelling and Analysis |
title_full | Depletion-of-Battery Attack: Specificity, Modelling and Analysis |
title_fullStr | Depletion-of-Battery Attack: Specificity, Modelling and Analysis |
title_full_unstemmed | Depletion-of-Battery Attack: Specificity, Modelling and Analysis |
title_short | Depletion-of-Battery Attack: Specificity, Modelling and Analysis |
title_sort | depletion of battery attack specificity modelling and analysis |
topic | wireless sensor networks security depletion-of-battery attack |
url | http://www.mdpi.com/1424-8220/18/6/1849 |
work_keys_str_mv | AT vladimirshakhov depletionofbatteryattackspecificitymodellingandanalysis AT insookoo depletionofbatteryattackspecificitymodellingandanalysis |