Anais Do XXII Simpósio Brasileiro De Segurança Da Informação E De Sistemas Computacionais (SBSeg 2022) 2022
DOI: 10.5753/sbseg.2022.224911
|View full text |Cite
|
Sign up to set email alerts
|

A New Defensive Technique Against Sleep Deprivation Attacks Driven by Battery Usage

Abstract: A significant amount of IoT devices are essentially powered by batteries and implements mechanisms to save energy, such as the sleep mode. The decision-making process deployed in IoT devices to enter to and exit from sleep mode can be exploited by remote users through sleep deprivation attacks, reducing the battery's lifetime and causing a denial of service. This paper presents a new defensive technique to mitigate and prevent sleep deprivation attacks. It is based on the local battery consumption data, that i… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 12 publications
0
1
0
Order By: Relevance
“…Because the mobility is constrained to the battery re-charging stations, disrupting the optimal connectivity provision, a DoS can disrupt the availability of the flying base station's operations. The battery-draining DoS has been more widely been studied in other wireless computing/networking contexts (wireless applications beyond the flying base station control), including in implantable medical/health devices [12,57,58], wireless charging [59,60], and standardized protocols of WiFi and Bluetooth [59][60][61][62].…”
Section: Battery Integrity Securitymentioning
confidence: 99%
“…Because the mobility is constrained to the battery re-charging stations, disrupting the optimal connectivity provision, a DoS can disrupt the availability of the flying base station's operations. The battery-draining DoS has been more widely been studied in other wireless computing/networking contexts (wireless applications beyond the flying base station control), including in implantable medical/health devices [12,57,58], wireless charging [59,60], and standardized protocols of WiFi and Bluetooth [59][60][61][62].…”
Section: Battery Integrity Securitymentioning
confidence: 99%