2023
DOI: 10.3390/fi15050187
|View full text |Cite
|
Sign up to set email alerts
|

Attacks on IoT: Side-Channel Power Acquisition Framework for Intrusion Detection

Abstract: This study proposes the wider use of non-intrusive side-channel power data in cybersecurity for intrusion detection. An in-depth analysis of side-channel IoT power behaviour is performed on two well-known IoT devices—a Raspberry Pi 3 model B and a DragonBoard 410c—operating under normal conditions and under attack. Attacks from the categories of reconnaissance, brute force and denial of service are applied, and the side-channel power data of the IoT testbeds are then studied in detail. These attacks are used t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
15
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 12 publications
(16 citation statements)
references
References 17 publications
1
15
0
Order By: Relevance
“…The Dragon_Pi, Dragon_Slice framework extends our previous work [6]. Indeed, this work can be considered as part two of our recent work [4], where we discuss and analyse the signatures of both normal and attack behaviours within the Dragon_Pi dataset. This recent work seeks to illustrate the value of power data in cybersecurity and discuss possible usages.…”
Section: Contributionsmentioning
confidence: 96%
See 3 more Smart Citations
“…The Dragon_Pi, Dragon_Slice framework extends our previous work [6]. Indeed, this work can be considered as part two of our recent work [4], where we discuss and analyse the signatures of both normal and attack behaviours within the Dragon_Pi dataset. This recent work seeks to illustrate the value of power data in cybersecurity and discuss possible usages.…”
Section: Contributionsmentioning
confidence: 96%
“…This recent work seeks to illustrate the value of power data in cybersecurity and discuss possible usages. Dragon_Pi and Dragon_Slice seek to fulfil some of the possible works that we said were possible based on the data in [4,6]. The specific contributions are as follows:…”
Section: Contributionsmentioning
confidence: 99%
See 2 more Smart Citations
“…In this regard, the early detection of cyberattacks plays a key role. Therefore, Lightbody et al [5] study whether malicious behavior of IoT devices can be detected based on their power consumption behavior. To this end, they identify unique power usage patterns for typical operations performed on an IoT device.…”
Section: Articlesmentioning
confidence: 99%