2019
DOI: 10.3390/electronics8050500
|View full text |Cite
|
Sign up to set email alerts
|

Evaluation of Resource Exhaustion Attacks against Wireless Mobile Devices

Abstract: Currently, energy resource exhaustion attacks targeted on modern autonomously working mobile devices are becoming more and more important. The underdevelopment of specialized defenses against energy exhaustion attacks as well as their often hidden nature for the owner of the target device determine a necessity of an integrated approach to modeling and evaluation of this class of attacks and various types of intruders. The paper analyzes conditions of applicability of energy resource exhaustion attacks performe… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 25 publications
0
4
0
Order By: Relevance
“…However, this mitigation scheme can handle only a minimal number of insider adversaries, improving network performance to a marginal degree. Desnitsky et al 15 proposed a vampire mitigation model that explored the applicability conditions of energy resource exhaustion based on multiple factors of influence. This model computed the performance indicators and derived the possibilities that hurdle the deployment of nodes in the area of application.…”
Section: Related Workmentioning
confidence: 99%
“…However, this mitigation scheme can handle only a minimal number of insider adversaries, improving network performance to a marginal degree. Desnitsky et al 15 proposed a vampire mitigation model that explored the applicability conditions of energy resource exhaustion based on multiple factors of influence. This model computed the performance indicators and derived the possibilities that hurdle the deployment of nodes in the area of application.…”
Section: Related Workmentioning
confidence: 99%
“…All of these types of attack can be applied against a target from the lower part of a cyber physical infrastructure [70,71] to the higher one, and can be performed during the transmission, storage, runtime, as well as during manufacturing or supply of information. In Figure 3, we show the structure for this simple manipulation techniques classification.…”
Section: Manipulationmentioning
confidence: 99%
“…However, an increase in the number of data processing locations will increase the attack surface proportionately [2]. Edge devices are generally used with limited resources [3], and the limited resources of the IoT poses a serious security threat as energy exhaustion and flood attacks, as well as various types of related intrusions have been described [4][5][6][7][8][9]. In addition, limited computing power and storage size and low battery capacity prevent IoT devices from executing conventional actions to support network security [10].…”
Section: Introductionmentioning
confidence: 99%