Denial-of-service attacks on battery-powered mobile computers
- 1 January 2004
- conference paper
- conference paper
- Published by Institute of Electrical and Electronics Engineers (IEEE)
Abstract
Sleep deprivation attacks are a form of denial of service attack whereby an attacker renders a pervasive computing device inoperable by draining the battery more quickly than it would be drained under normal usage. We describe three main methods for an attacker to drain the battery: (1) service request power attacks, where repeated requests are made to the victim for services, typically over a network - even if the service is not provided the victim must expend energy deciding whether or not to honor the request; (2) benign power attacks, where the victim is made to execute a valid but energy-hungry task repeatedly, and (3) malignant power attacks, where the attacker modifies or creates an executable to make the system consume more energy than it would otherwise. Our initial results demonstrate the increased power consumption due to these attacks, which we believe are the first real examples of these attacks to appear in the literature. We also propose a power-secure architecture to thwart these power attacks by employing multi-level authentication and energy signatures.Keywords
This publication has 16 references indexed in Scilit:
- On communication security in wireless ad-hoc sensor networksPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2003
- Maximum power estimation for sequential circuits using a test generation based techniquePublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Compilation techniques for low energy: an overviewPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Power-conscious software design-a framework for modeling software on hardwarePublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Issues in wearable computing for medical monitoring applications: a case study of a wearable ECG monitoring devicePublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Pervasive computing: vision and challengesIEEE Wireless Communications, 2001
- Fast, flexible, cycle-accurate energy estimationPublished by Association for Computing Machinery (ACM) ,2001
- Physical side-channel attacks on cryptographic systemsSoftware Focus, 2000
- Energy-efficient design of battery-powered embedded systemsPublished by Association for Computing Machinery (ACM) ,1999
- Some computer science issues in ubiquitous computingCommunications of the ACM, 1993