A Denial of Sleep Attack Against IoT System

来源 :科学与财富 | 被引量 : 0次 | 上传用户:bigwbiso
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
  摘 要:Internet of Things (IoT) often utilizes numerous low power sensor nodes to monitor physical surroundings. Owing to replaceable batteries as the power supply, an IoT system is under threats from Denial of Sleep (DoSL) attacks which prevent the sensor nodes from routine sleep to exhaust the battery rapidly. As a result, the devices shut down and fail to meet the basic requirement of operating for years. This paper evaluates the performance of DoSL attacks with 3 various sleep ratios on a nRF communication based IoT system. A mathematic model is proposed for the performance analysis compared with the attack experiment results.
  關键词:IoT; DoSL attack; Wireless Sensor Networks(WSN)
  I. INTRODUCTION
  The Internet of Things (IoT) system is vulnerable to Denial of Sleep (DoSL) attack because sensor nodes are powered by replaceable batteries and are programmed to obey sleep routines for saving energy and extending the sensor lifespan. DoSL may force the nodes awake for a severe power consumption, causing battery exhaustion and definitively shutdown [1].
  In this paper, the effects of DoSL attack will be evaluated in terms of sleep ratio by testing on a wireless sensor network IoT system based on nRF communication module. A mathematic model is employed to estimate power consumption as a theoretical battery drain analysis. The theoretical and experimental measurement results will be displayed in charts to reveal the association between sleep ratios and DoSL attack effects.
  II.POWER DRAIN ANALYSIS
  According to Raymond, et al. [2], DoSL attacks can be modeled by using the basic average of the power drain during different operating states of the nodes.
  Cbat(t) = Cbat t=0 - Rs Ps +(1 - Rs)Pa (1)
  Cbat t=0 is battery capacity at time t=0. Rs represents sleep ratio. Ps is the power at sleep state and Pa is that at active state. The theoretical remaining battery capacity can be calculated based on the equation (1). The experimental one will be measured by equation (2).
  C(t)=Cbat t=0-W*t (2)
  III.ATTACK IMPLEMENTATION
  The victim node in the IoT system is implemented based on Arduino. The theoretical active current is 40mA, while the sleep current is 1.7μA. Meanwhile, the voltage of the batteries that the experiment utilizes is 6.3V. The battery capacity is assumed as 1200mAh. The normal working state is 8-second sleep and 4-second working.
  IV.RESULTS
  Three tests that vary in sleep ratios have been run. Figure 1 shows both the theoretical and experimental battery consumption in 5 hours in terms of 3 different sleep ratios. The experimental plots approximate to linearity, demonstrating that the battery consumption is negatively correlated with the sleep ratio. Furthermore, all the experimental lines are much steeper than the theoretical ones because the actual current in the sleep state is far greater than the theoretical which is measured as 19~20mA. The exterior components seem to still operate with higher power consumption in sleep mode.
  V.CONCLUSION
  This paper has critically evaluated the performance of DoSL attacks with 3 various sleep ratios on a nRF communication based IoT system. The sensor lifespan can be largely curtailed in the case of suffering from DoSL attacks with tiny sleep ratios. It proves that the vulnerability presenting in a IoT system is likely to leave IoT devices unavailable after days of DoSL attacking.
  References
  [1]I. Andrea, C. Chrysostomou, and G. Hadjichristofi, "Internet of things: Security vulnerabilities and challenges," in Computers and Communication (ISCC), 2015 IEEE Symposium on, 2015, pp. 180-187.
  [2]D. R. Raymond, R. C. Marchany, M. I. Brownfield, and S. F. Midkiff, "Effects of denial-of-sleep attacks on wireless sensor network MAC protocols," IEEE transactions on vehicular technology, vol. 58, pp. 367-380, 2009.
其他文献
摘 要:近年来我国正在进行必要的改革,将以往的问题加以解决可以加快我国社会主义社会的发展。测绘工程是我国的重要工程项目。质量管理与系统控制作为测绘工程的核心,始终是影响国家工程质量与建设成果的关键因素,是推动全面建成小康社会的重要力量。所以对于测绘过程中的质量管理与系统控制的研究以及如何解决此过程中出现的问题是现阶段我国的一项重要工作。本研究将介绍其基本概况,分析出现的问题,并提出相应的解决措施。
摘 要:本文在详细介绍了海外总承包项目勘察设计的工作特点的基础上,对当前国外设计企业在承担海外项目勘察设计当中存在的众多问题,同时就设计理念以及设计管理等方面提出了具有参考价值的建议,旨在提升企业海外总承包项目勘察设计工作质量。  关键词:海外项目;勘察设计;特点;策略  近年来,我国综合国力进一步增强,尤其是企业的发展更可谓是迅速。在经济全球化的背景下,我国有着越来越多的企业走出国门,海外总承包
摘 要:兽医制度是畜禽防疫中一项基本制度,对动物疾病防疫工作有着重要的影响。但是现阶段部分兽医由于受到文化水平的限制,加上没有受过系统专业的动物疾病防治培训,所以在疾病防治中还存在不少误区,影响动物疾病防治的成效。本文将围绕动物疾病防治,从兽医防治误区角度出发,结合我国当前兽医防治工作现状,对兽医在动物疾病防治中存在的误区进行探讨分析,并给出相应的解决对策,希望能给相关人员和工作提供参考。  关键
摘 要:在现阶段的发展中,环评工作的基础和前提是环境监测,环评工作可以通过环境监测及时的了解、掌握环境情况,有效的提升人们对于环境保护的质量。因此,环境监测的实施直接影响环评工作的结果,所以工作人员一定要重视环境监测在环评工作中的作用。为了更好地促进环评工作的开展,本文就环评种环境监测工作存在的一些问题进行分析。  关键词:环评;环境监测;问题;解决对策  近年来,随着我国社会经济的不断发展,人们
The Internet of Things (IoT) is a fast-growing industry that is bound to transform homes, cities and factories. Due to its broad influence in our life, IoT has
摘 要:随着我国信息技术快速发展,根据当前我国数据中心安全保护现状,将传统的数据中心安全防范体系作为基本框架,根据云计算特点与要求为数據中心安全体系提出新的解决方案,通过运用关键技术和模块来对数据中心安全性加以控制,确保数据中心安全,为数据中心安全体系发展奠定了坚实的基础。  关键词:云计算;数据中心;设计;安全保护  数据中心主要是为用户提供服务器资源、网络资源、宽带接入和主机专业化托管等网络服
目的:近期的临床试验结果表明,心脏生物标志物,包括脑钠肽(Brainnatriuretic peptide BNP)和肌钙蛋白,有可能成为急性肺栓塞(AcutePulmonary Embolization APE)进行危险分层评估
目的:髓母细胞瘤(medulloblastoma)是一种好发于15岁以下儿童的颅内恶性肿瘤,是中枢神经系统恶性程度最高的神经上皮性肿瘤之一。2007年《世界卫生组织中枢神经系统肿瘤分类标
摘 要:本文采用文献资料法、专家访谈等方法,从网球运动的项目特点、网球运动员的体能特征,身体供能系统的选择,功能性训练等方面较全面综合的对高水平网球运动员的体能训练进行归纳分析,以期对高校高水平网球运动员的体能训练提供理论性的参考和建议。  关键词:高校 网球 体能训练  前言:  在截止2017年的全国大学生网球锦标赛中,参加比赛的高校高水平队伍已达三十余所,从比赛的过程和结果综合分析来看,参赛
摘 要:苯并咪唑类配合物一直都是研究热点,之所以引起人们极大的关注,主要是由于这类配合物具有生物活性、热力学和动力学稳定性、良好的光学性能及配位能力、抗氧化性质、光电磁化学性质,并具备配合物和复合高分子的特点,在航空航天、荧光探针、光电材料、催化、生命科学、药物等领域有广泛的用途。本文综述了近年来含有苯并咪唑衍生物的过渡金属配合物的构筑及其性能的研究进展。  关键词:配合物;苯并咪唑;性能;研究