Depletion-of-Battery Attack: Specificity, Modelling and Analysis

The emerging Internet of Things (IoT) has great potential; however, the societal costs of the IoT can outweigh its benefits. To unlock IoT potential, there needs to be improvement in the security of IoT applications. There are several standardization initiatives for sensor networks, which eventually...

Full description

Bibliographic Details
Main Authors: Vladimir Shakhov, Insoo Koo
Format: Article
Language:English
Published: MDPI AG 2018-06-01
Series:Sensors
Subjects:
Online Access:http://www.mdpi.com/1424-8220/18/6/1849
_version_ 1798039758405894144
author Vladimir Shakhov
Insoo Koo
author_facet Vladimir Shakhov
Insoo Koo
author_sort Vladimir Shakhov
collection DOAJ
description The emerging Internet of Things (IoT) has great potential; however, the societal costs of the IoT can outweigh its benefits. To unlock IoT potential, there needs to be improvement in the security of IoT applications. There are several standardization initiatives for sensor networks, which eventually converge with the Internet of Things. As sensor-based applications are deployed, security emerges as an essential requirement. One of the critical issues of wireless sensor technology is limited sensor resources, including sensor batteries. This creates a vulnerability to battery-exhausting attacks. Rapid exhaustion of sensor battery power is not only explained by intrusions, but can also be due to random failure of embedded sensor protocols. Thus, most wireless sensor applications, without tools to defend against rash battery exhausting, would be unable to function during prescribed times. In this paper, we consider a special type of threat, in which the harm is malicious depletion of sensor battery power. In contrast to the traditional denial-of-service attack, quality of service under the considered attack is not necessarily degraded. Moreover, the quality of service can increase up to the moment of the sensor set crashes. We argue that this is a distinguishing type of attack. Hence, the application of a traditional defense mechanism against this threat is not always possible. Therefore, effective methods should be developed to counter the threat. We first discuss the feasibility of rash depletion of battery power. Next, we propose a model for evaluation of energy consumption when under attack. Finally, a technique to counter the attack is discussed.
first_indexed 2024-04-11T21:58:10Z
format Article
id doaj.art-ff240533b7224cc1b99a9e9497c7d64b
institution Directory Open Access Journal
issn 1424-8220
language English
last_indexed 2024-04-11T21:58:10Z
publishDate 2018-06-01
publisher MDPI AG
record_format Article
series Sensors
spelling doaj.art-ff240533b7224cc1b99a9e9497c7d64b2022-12-22T04:01:02ZengMDPI AGSensors1424-82202018-06-01186184910.3390/s18061849s18061849Depletion-of-Battery Attack: Specificity, Modelling and AnalysisVladimir Shakhov0Insoo Koo1Automobile/Ship Electronics Convergence Center, University of Ulsan, Ulsan 680-749, KoreaThe School of Electrical Engineering, University of Ulsan, Ulsan 680-749, KoreaThe emerging Internet of Things (IoT) has great potential; however, the societal costs of the IoT can outweigh its benefits. To unlock IoT potential, there needs to be improvement in the security of IoT applications. There are several standardization initiatives for sensor networks, which eventually converge with the Internet of Things. As sensor-based applications are deployed, security emerges as an essential requirement. One of the critical issues of wireless sensor technology is limited sensor resources, including sensor batteries. This creates a vulnerability to battery-exhausting attacks. Rapid exhaustion of sensor battery power is not only explained by intrusions, but can also be due to random failure of embedded sensor protocols. Thus, most wireless sensor applications, without tools to defend against rash battery exhausting, would be unable to function during prescribed times. In this paper, we consider a special type of threat, in which the harm is malicious depletion of sensor battery power. In contrast to the traditional denial-of-service attack, quality of service under the considered attack is not necessarily degraded. Moreover, the quality of service can increase up to the moment of the sensor set crashes. We argue that this is a distinguishing type of attack. Hence, the application of a traditional defense mechanism against this threat is not always possible. Therefore, effective methods should be developed to counter the threat. We first discuss the feasibility of rash depletion of battery power. Next, we propose a model for evaluation of energy consumption when under attack. Finally, a technique to counter the attack is discussed.http://www.mdpi.com/1424-8220/18/6/1849wireless sensor networkssecuritydepletion-of-battery attack
spellingShingle Vladimir Shakhov
Insoo Koo
Depletion-of-Battery Attack: Specificity, Modelling and Analysis
Sensors
wireless sensor networks
security
depletion-of-battery attack
title Depletion-of-Battery Attack: Specificity, Modelling and Analysis
title_full Depletion-of-Battery Attack: Specificity, Modelling and Analysis
title_fullStr Depletion-of-Battery Attack: Specificity, Modelling and Analysis
title_full_unstemmed Depletion-of-Battery Attack: Specificity, Modelling and Analysis
title_short Depletion-of-Battery Attack: Specificity, Modelling and Analysis
title_sort depletion of battery attack specificity modelling and analysis
topic wireless sensor networks
security
depletion-of-battery attack
url http://www.mdpi.com/1424-8220/18/6/1849
work_keys_str_mv AT vladimirshakhov depletionofbatteryattackspecificitymodellingandanalysis
AT insookoo depletionofbatteryattackspecificitymodellingandanalysis