2018 IEEE International Conference on Communications Workshops (ICC Workshops) 2018
DOI: 10.1109/iccw.2018.8403561
|View full text |Cite
|
Sign up to set email alerts
|

Energy Life-Time of Wireless Nodes with Network Attacks and Mitigation

Abstract: In the Internet of Things (IoT), a simple form of attack can deplete the energy available to operate the sensor nodes. Some of these nodes may use batteries, while others may harvest ambient energy such as photovoltaic, or electromagnetic, or vibration based energy. We first briefly survey the types of attacks which aim at the nodes' energy provisioning systems. This paper analyses the effect of such attacks on the energy lifetime of a wireless node. Then we provide models to estimate the effect of attacks tha… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
13
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
5
2
2

Relationship

1
8

Authors

Journals

citations
Cited by 21 publications
(13 citation statements)
references
References 24 publications
0
13
0
Order By: Relevance
“…For instance, the adversary conducts a discovery phase to learn the accumulative energy dynamics of the network, by probing and estimating the level of available battery on each individual node of the system. Countermeasures to the attack, like those in [16,27] are similar to some of the ideas discussed in Section 5.…”
Section: Routing Literaturementioning
confidence: 91%
See 1 more Smart Citation
“…For instance, the adversary conducts a discovery phase to learn the accumulative energy dynamics of the network, by probing and estimating the level of available battery on each individual node of the system. Countermeasures to the attack, like those in [16,27] are similar to some of the ideas discussed in Section 5.…”
Section: Routing Literaturementioning
confidence: 91%
“…In this case, the maximum bandwidth (cf. Lines [16][17][18] is modified. Since the adversary cannot get any further information w.r.t.…”
Section: Attack Implementationmentioning
confidence: 99%
“…In [84], the authors derived a new PFS, which is a distinct approach from G-network, for a tandem network of N nodes using harvested energy stored in batteries. The effect of battery attacks at the nodes of energy provisioning systems was investigated in [46]. A simple mitigation technique was proposed for a wireless node with a renewable or a replaceable battery to drop a fraction of the traffic to prolong battery lifetime.…”
Section: Energy Packet Network With Zero Service Timementioning
confidence: 99%
“…Denial-of-Sleep attacks may target various IoT protocols [6]. Various strategies can be used, ranging from useless data packets that receivers must process to jamming of radio channels that causes errors and thus costly retransmissions [9]. Furthermore, malicious control packets may lead to excessive energy consumption due to e.g., illegitimate duty-cycle modifications.…”
Section: Background and Related Workmentioning
confidence: 99%