Analysis of energy resource depletion attacks on wireless devices
نویسندگان
چکیده
منابع مشابه
Energy Attacks on Mobile Devices
All mobile devices are energy-constrained. They use batteries that allows using the device for a limited amount of time. In general, energy attacks on mobile devices are denial of service (DoS) type of attacks. While previous studies have analyzed the energy attacks in servers, no existing work has analyzed the energy attacks on mobile devices. As such, in this paper, we present the first syste...
متن کاملEnergy Depletion Attacks: Detecting and Blocking in Wireless Sensor Network
one of the most complicated attacks in wireless sensor network is energy depletion attack. In which vampire attack and Distributed Denial of Service (DDOS) attack were leading. In this paper using a newly proposed Enhanced Ad Hoc on-Demand Vector (ENAODV) routing protocol, the link break at distant node is repaired with alternate path selection of shortest route in secure manner. The Adaptive T...
متن کاملEnergy Analysis of Public-Key Cryptography on Small Wireless Devices
For many applications of small wireless devices, secure communication is an important requirement. In this paper, we quantify the energy costs of authentication and key exchange based on public-key cryptography on an 8bit microcontroller platform. We present a comparison of two public-key algorithms, RSA and Elliptic Curve Cryptography (ECC), under two authentication scenarios. In the first sce...
متن کاملSeek and Destroy: Targeted Resource Depletion Attacks on Sensor Networks
Denial of service attacks can be catastrophic in wireless sensor networks. Typical denial of service attacks consist of either communications jamming or resource depletion through forcing continuous stimuli and communication between motes on the network. Localization is another interesting challenge in the world of sensor networks. Many applications utilizing sensor networks require that the an...
متن کاملGhost-in-the-Wireless: Energy Depletion Attack on ZigBee
ZigBee has been recently drawing a lot of attention as a promising solution for ubiquitous computing. The ZigBee devices are normally resource-limited, making the network susceptible to a variety of security threats. This paper presents a severe attack on ZigBee networks termed as ghost, which leverages the underlying vulnerabilities of the IEEE 802.15.4 security suites to deplete the energy of...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Izvestiâ vysših učebnyh zavedenij. Priborostroenie
سال: 2018
ISSN: 0021-3454
DOI: 10.17586/0021-3454-2018-61-4-291-297