Abstract

The emerging Internet of Things (IoT) has great potential; however, the societal costs of the IoT can outweigh its benefits. To unlock IoT potential, there needs to be improvement in the security of IoT applications. There are several standardization initiatives for sensor networks, which eventually converge with the Internet of Things. As sensor-based applications are deployed, security emerges as an essential requirement. One of the critical issues of wireless sensor technology is limited sensor resources, including sensor batteries. This creates a vulnerability to battery-exhausting attacks. Rapid exhaustion of sensor battery power is not only explained by intrusions, but can also be due to random failure of embedded sensor protocols. Thus, most wireless sensor applications, without tools to defend against rash battery exhausting, would be unable to function during prescribed times. In this paper, we consider a special type of threat, in which the harm is malicious depletion of sensor battery power. In contrast to the traditional denial-of-service attack, quality of service under the considered attack is not necessarily degraded. Moreover, the quality of service can increase up to the moment of the sensor set crashes. We argue that this is a distinguishing type of attack. Hence, the application of a traditional defense mechanism against this threat is not always possible. Therefore, effective methods should be developed to counter the threat. We first discuss the feasibility of rash depletion of battery power. Next, we propose a model for evaluation of energy consumption when under attack. Finally, a technique to counter the attack is discussed.

Highlights

  • The technology of wireless sensor systems has evolved over the last decade from where these systems were designed in a technology-dependent manner to a stage where some broad conceptual understanding of issues exists

  • There are several projects on, and standardization initiatives for, sensor networks, which may eventually converge with the Internet of Things (IoT)

  • An approach based on spread-spectrum and a lower duty cycle is used against the jamming attack; tamper-proofing and special key management schemes are used against the tampering attack; an error correcting code is used against link layer attacks; rate limitation is used against any type of resource exhaustion; authentication, encryption, and probing are used against manipulation of routing information, selective forwarding attacks, and Sybil attacks

Read more

Summary

Introduction

The technology of wireless sensor systems has evolved over the last decade from where these systems were designed in a technology-dependent manner to a stage where some broad conceptual understanding of issues exists. The taxonomy of denial-of-service (DoS) attacks in WSNs was described [15] According to these papers, attacks against sensors can be classified into attacks on the physical, medium access control (MAC), network, transportation, and application layers. An approach based on spread-spectrum and a lower duty cycle is used against the jamming attack; tamper-proofing and special key management schemes are used against the tampering attack; an error correcting code is used against link layer attacks; rate limitation is used against any type of resource exhaustion; authentication, encryption, and probing are used against manipulation of routing information, selective forwarding attacks, and Sybil attacks. Quality of service can increase, right up to the moment some critical set of sensors crashes This gives rise to a novel type of attack that is not DoS.

Related Works
DoB Feasibility and Features
DoB Analysis
System
DoB Based on Excessive Packets
The presented
DoB based on Excessive Transmission Power
DoB Detection
Performance Analysis
Findings
Conclusions
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.