Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks 2013
DOI: 10.1145/2462096.2462127
|View full text |Cite
|
Sign up to set email alerts
|

Energy attacks and defense techniques for wireless systems

Abstract: This paper addresses the energy attacks towards wireless systems, where energy is the most critical constraint to lifetime and reliability. We for the first time propose a hardwarebased energy attack, namely energy hardware Trojans (HTs), which can be well hidden in the wireless systems and trigger ultra-high energy increases at runtime. Then, we develop a non-destructive HT detection approach to identify the energy attack by remotely sampling the power profiles of the system and characterizing the gate-level … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2013
2013
2018
2018

Publication Types

Select...
4
1

Relationship

2
3

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 37 publications
0
2
0
Order By: Relevance
“…The vampire attacks are very difficult to detect and they basically deplete the resources by continuously repeating the corrupted data or choosing the longer path for the routing data [8]. On the other hand, a hardware based energy attack, hardware trojans, studied in [29] where it is showed that a huge energy depletion may occur by embedding a hardware trojan trigger to the integrated circuit.…”
Section: A Earlier Workmentioning
confidence: 99%
“…The vampire attacks are very difficult to detect and they basically deplete the resources by continuously repeating the corrupted data or choosing the longer path for the routing data [8]. On the other hand, a hardware based energy attack, hardware trojans, studied in [29] where it is showed that a huge energy depletion may occur by embedding a hardware trojan trigger to the integrated circuit.…”
Section: A Earlier Workmentioning
confidence: 99%
“…Specifically, distributed sensing raises the importance of sensor security to an even higher level [1][2] [3][4] [5]. It is important for the sensor user to verify that the remotely received data is actually from the trusted sensors in the distributed system.…”
Section: Introductionmentioning
confidence: 99%