Battery draining attacks against edge computing nodes in IoT networks

01/31/2020
by   Ryan Smith, et al.
0

Many IoT devices, especially those deployed at the network edge have limited power resources. A number of attacks aim to exhaust these resources and drain the batteries of such edge nodes. In this work, we study the effects of a variety of battery draining attacks against edge nodes. Through simulation, we clarify the extent to which such attacks are able to increase the usage and hence waste the power resources of edge nodes. Specifically, we implement hello flooding, packet flooding, selective forwarding, rank attack, and versioning attack in ContikiOS and simulate them in the Cooja simulator, and measure and report a number of time and power resource usage metrics including CPU time, low power mode time, TX/RX time, and battery consumption. Besides, we test the stretch attack with three different batteries as an extreme scenario. Our extensive measurements enable us to compare the effectiveness of these attacks. Our results show that Versioning attack is the most severe attack in terms of draining the power resources of the network, followed by Packet Flooding and Hello Flood attacks. Furthermore, we confirm that Selective Forwarding and Rank attacks are not able to considerably increase the power resource usage in our scenarios. By quantifying the effects of these attacks, we demonstrate that under specific scenarios, Versioning attack can be three to four times as effective as Packet Flooding and Hello Flood attacks in wasting network resources, while Packet Flooding is generally comparable to Hello Flood in CPU and TX time usage increase but twice as powerful in draining device batteries.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
07/02/2020

Five-Layers SDP-Based Hierarchical Security Paradigm for Multi-access Edge Computing

The rise in embedded and IoT device usage comes with an increase in LTE ...
research
01/18/2022

Secure IoT Routing: Selective Forwarding Attacks and Trust-based Defenses in RPL Network

IPv6 Routing Protocol for Low Power and Lossy Networks (RPL) is an essen...
research
10/07/2019

IoTSim-Edge: A Simulation Framework for Modeling the Behaviour of IoT and Edge Computing Environments

This paper proposes a novel simulator IoTSim-Edge, which captures the be...
research
11/25/2020

LEADER: Low Overhead Rank Attack Detection for Securing RPL based IoT

In recent times researchers have found several security vulnerabilities ...
research
10/27/2018

Resource Control in P2P Cryptocurrency Networks

For decentralised P2P networks, it is very important to have a mechanism...
research
10/01/2021

Data-Driven Detection and Identification of IoT-Enabled Load-Altering Attacks in Power Grids

Advances in edge computing are powering the development and deployment o...
research
12/24/2020

Auto-tune POIs: Estimation of distribution algorithms for efficient side-channel analysis

Due to the constant increase and versatility of IoT devices that should ...

Please sign up or login with your details

Forgot password? Click here to reset