Analysis of energy resource depletion attacks on wireless devices

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Energy Attacks on Mobile Devices

All mobile devices are energy-constrained. They use batteries that allows using the device for a limited amount of time. In general, energy attacks on mobile devices are denial of service (DoS) type of attacks. While previous studies have analyzed the energy attacks in servers, no existing work has analyzed the energy attacks on mobile devices. As such, in this paper, we present the first syste...

متن کامل

Energy Depletion Attacks: Detecting and Blocking in Wireless Sensor Network

one of the most complicated attacks in wireless sensor network is energy depletion attack. In which vampire attack and Distributed Denial of Service (DDOS) attack were leading. In this paper using a newly proposed Enhanced Ad Hoc on-Demand Vector (ENAODV) routing protocol, the link break at distant node is repaired with alternate path selection of shortest route in secure manner. The Adaptive T...

متن کامل

Energy Analysis of Public-Key Cryptography on Small Wireless Devices

For many applications of small wireless devices, secure communication is an important requirement. In this paper, we quantify the energy costs of authentication and key exchange based on public-key cryptography on an 8bit microcontroller platform. We present a comparison of two public-key algorithms, RSA and Elliptic Curve Cryptography (ECC), under two authentication scenarios. In the first sce...

متن کامل

Seek and Destroy: Targeted Resource Depletion Attacks on Sensor Networks

Denial of service attacks can be catastrophic in wireless sensor networks. Typical denial of service attacks consist of either communications jamming or resource depletion through forcing continuous stimuli and communication between motes on the network. Localization is another interesting challenge in the world of sensor networks. Many applications utilizing sensor networks require that the an...

متن کامل

Ghost-in-the-Wireless: Energy Depletion Attack on ZigBee

ZigBee has been recently drawing a lot of attention as a promising solution for ubiquitous computing. The ZigBee devices are normally resource-limited, making the network susceptible to a variety of security threats. This paper presents a severe attack on ZigBee networks termed as ghost, which leverages the underlying vulnerabilities of the IEEE 802.15.4 security suites to deplete the energy of...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Izvestiâ vysših učebnyh zavedenij. Priborostroenie

سال: 2018

ISSN: 0021-3454

DOI: 10.17586/0021-3454-2018-61-4-291-297