Optimal Green Hybrid Attacks in Secure IoT

12/03/2019
by   Bhawna Ahuja, et al.
0

In pursuance to understand the behavior of a potential green hybrid attacker in secure internet-of-things (IoT), this letter investigates optimal energy utilization from the attacker's viewpoint. Specifically, we propose a novel framework for optimizing the efficacy of a hybrid attacker, possessing capability to both eavesdrop and jam, while considering the underlying energy consumption. In particular, we maximize the attacker energy efficiency (AEE) in secure IoT by deriving the analytical solutions for jointly global-optimal attacking mode, eavesdropping rate, and jamming power. Numerical results, validating analytical claims, reveal that the proposed green design can offer about 45

READ FULL TEXT

page 1

page 2

page 3

page 4

research
06/25/2019

Enabling security and High Energy Efficiency in the Internet of Things with Massive MIMO Hybrid Precoding

Recently, the security of Internet of Things (IoT) has been an issue of ...
research
06/15/2021

Low-Energy and CPA-Resistant Adiabatic CMOS/MTJ Logic for IoT Devices

The tremendous growth in the number of Internet of Things (IoT) devices ...
research
11/30/2019

Secure Wireless Internet of Things Communication using Virtual Private Networks

The Internet of Things (IoT) is an exploding market as well as a importa...
research
02/17/2021

Performance Analysis for Correlated AoI and Energy Efficiency in Heterogeneous CR-IoT System

We consider a cognitive radio based Internet of Things (CR-IoT) system w...
research
04/29/2023

ZIRCON: Zero-watermarking-based approach for data integrity and secure provenance in IoT networks

The Internet of Things (IoT) is integrating the Internet and smart devic...
research
08/08/2018

A Hybrid Dynamic-regenerative Damping Scheme for Energy Regeneration in Variable Impedance Actuators

Increasing research efforts have been made to improve the energy efficie...
research
12/02/2022

Fast Detection of Burst Jamming for Delay-Sensitive Internet-of-Things Applications

In this paper, we investigate the design of a burst jamming detection me...

Please sign up or login with your details

Forgot password? Click here to reset