2019 6th International Conference on Control, Decision and Information Technologies (CoDIT) 2019
DOI: 10.1109/codit.2019.8820402
|View full text |Cite
|
Sign up to set email alerts
|

Denial-of-Sleep Attacks against IoT Networks

Abstract: Numerous medium access control (MAC) have been proposed for Low-power Lossy Networks (LLNs) over the recent years. They aim at ensuring both energy efficiency and robustness of the communication transmissions. Nowadays, we observe deployments of LLNs for potentially critical application scenarios (e.g., plant monitoring, building automation), which require both determinism and security guarantees. They involve battery-powered devices which communicate over lossy wireless links. Radio interfaces are turned off … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
22
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
1
1

Relationship

1
6

Authors

Journals

citations
Cited by 23 publications
(22 citation statements)
references
References 20 publications
0
22
0
Order By: Relevance
“…And D, Attack interval, respectively. As shown in the figure, ASDA-RSA increases the residual energy by more than 11,14,15,16,20, and 23% those of current approaches, respectively. Figure 12 and 13, shows the comparison of the ASDA-RSA proposed scheme, CrossLayer, ASDA-BlowFish, ASDA-AES, GA-DoSLD, ASDA-3DES, and ASDA-DES models in term of Lifetime.…”
Section: Simulation Resultsmentioning
confidence: 85%
See 2 more Smart Citations
“…And D, Attack interval, respectively. As shown in the figure, ASDA-RSA increases the residual energy by more than 11,14,15,16,20, and 23% those of current approaches, respectively. Figure 12 and 13, shows the comparison of the ASDA-RSA proposed scheme, CrossLayer, ASDA-BlowFish, ASDA-AES, GA-DoSLD, ASDA-3DES, and ASDA-DES models in term of Lifetime.…”
Section: Simulation Resultsmentioning
confidence: 85%
“…The vulnerabilities existing in MAC solutions as well as embeddable mechanisms to provide inherent security are the main focus of this paper. 20 Specifically, we investigate scenarios of physical jamming in which, attackers prevent communication establishment and thus, result in repetitive retransmissions as well as additional duty for the target devices. Prior to focusing on technologies in communication that are investigated by a number of main standardization bodies, numerous existing attacks are investigated in detail.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Low-Level Issues encompasses all threats against the lowest network layers, Physical and Data-Link, but also against the hardware itself. This includes such attacks as jamming, sleep deprivation, otherwise know as Denial-of-Sleep [103], which forces devices to stay awake and transmit data, causing their energy reserves to dwindle, resulting in a DoS attack [104], or a low level spoofing attack, like faking a MAC address to trick neighbours.…”
Section: Iotmentioning
confidence: 99%
“…The constraint nature of the target IoT devices is not be taken into account in the threat model since we only consider the attacks that are aiming to compromise the pairing procedure. Thus, the denial of sleep [74] or the denial of service attacks [75] are not in the score of this work. We conclude the existence of two categories of threat models:…”
mentioning
confidence: 95%