亚洲免费av电影一区二区三区,日韩爱爱视频,51精品视频一区二区三区,91视频爱爱,日韩欧美在线播放视频,中文字幕少妇AV,亚洲电影中文字幕,久久久久亚洲av成人网址,久久综合视频网站,国产在线不卡免费播放

        ?

        A Denial of Sleep Attack Against IoT System

        2018-04-26 10:32:48YuexuanLiKunWangQiankunShengXinHuang
        科學(xué)與財富 2018年6期

        Yuexuan Li Kun Wang Qiankun Sheng Xin Huang

        摘 要:Internet of Things (IoT) often utilizes numerous low power sensor nodes to monitor physical surroundings. Owing to replaceable batteries as the power supply, an IoT system is under threats from Denial of Sleep (DoSL) attacks which prevent the sensor nodes from routine sleep to exhaust the battery rapidly. As a result, the devices shut down and fail to meet the basic requirement of operating for years. This paper evaluates the performance of DoSL attacks with 3 various sleep ratios on a nRF communication based IoT system. A mathematic model is proposed for the performance analysis compared with the attack experiment results.

        關(guān)鍵詞:IoT; DoSL attack; Wireless Sensor Networks(WSN)

        I. INTRODUCTION

        The Internet of Things (IoT) system is vulnerable to Denial of Sleep (DoSL) attack because sensor nodes are powered by replaceable batteries and are programmed to obey sleep routines for saving energy and extending the sensor lifespan. DoSL may force the nodes awake for a severe power consumption, causing battery exhaustion and definitively shutdown [1].

        In this paper, the effects of DoSL attack will be evaluated in terms of sleep ratio by testing on a wireless sensor network IoT system based on nRF communication module. A mathematic model is employed to estimate power consumption as a theoretical battery drain analysis. The theoretical and experimental measurement results will be displayed in charts to reveal the association between sleep ratios and DoSL attack effects.

        II.POWER DRAIN ANALYSIS

        According to Raymond, et al. [2], DoSL attacks can be modeled by using the basic average of the power drain during different operating states of the nodes.

        Cbat(t) = Cbat t=0 - Rs Ps +(1 - Rs)Pa (1)

        Cbat t=0 is battery capacity at time t=0. Rs represents sleep ratio. Ps is the power at sleep state and Pa is that at active state. The theoretical remaining battery capacity can be calculated based on the equation (1). The experimental one will be measured by equation (2).

        C(t)=Cbat t=0-W*t (2)

        III.ATTACK IMPLEMENTATION

        The victim node in the IoT system is implemented based on Arduino. The theoretical active current is 40mA, while the sleep current is 1.7μA. Meanwhile, the voltage of the batteries that the experiment utilizes is 6.3V. The battery capacity is assumed as 1200mAh. The normal working state is 8-second sleep and 4-second working.

        IV.RESULTS

        Three tests that vary in sleep ratios have been run. Figure 1 shows both the theoretical and experimental battery consumption in 5 hours in terms of 3 different sleep ratios. The experimental plots approximate to linearity, demonstrating that the battery consumption is negatively correlated with the sleep ratio. Furthermore, all the experimental lines are much steeper than the theoretical ones because the actual current in the sleep state is far greater than the theoretical which is measured as 19~20mA. The exterior components seem to still operate with higher power consumption in sleep mode.

        V.CONCLUSION

        This paper has critically evaluated the performance of DoSL attacks with 3 various sleep ratios on a nRF communication based IoT system. The sensor lifespan can be largely curtailed in the case of suffering from DoSL attacks with tiny sleep ratios. It proves that the vulnerability presenting in a IoT system is likely to leave IoT devices unavailable after days of DoSL attacking.

        References

        [1]I. Andrea, C. Chrysostomou, and G. Hadjichristofi, "Internet of things: Security vulnerabilities and challenges," in Computers and Communication (ISCC), 2015 IEEE Symposium on, 2015, pp. 180-187.

        [2]D. R. Raymond, R. C. Marchany, M. I. Brownfield, and S. F. Midkiff, "Effects of denial-of-sleep attacks on wireless sensor network MAC protocols," IEEE transactions on vehicular technology, vol. 58, pp. 367-380, 2009.

        久久亚洲精品一区二区| 中文国产日韩欧美二视频| 尤物yw无码网站进入| 午夜在线观看有码无码| 亚洲高清一区二区精品| 无码av中文一区二区三区| 99精产国品一二三产品香蕉| 国产在线不卡免费播放| 日韩视频午夜在线观看| 亚洲av综合色区无码另类小说| 免费99精品国产自在在线| 伊人精品无码AV一区二区三区| 久久天堂精品一区专区av| 丰满少妇按摩被扣逼高潮| 最近中文字幕大全在线电影视频| 亚洲黄色一级毛片| 国产蜜臀精品一区二区三区| 无遮挡很爽很污很黄的女同| 少妇无码av无码专区| 久久精品—区二区三区无码伊人色 | 真实人与人性恔配视频| 66lu国产在线观看| 日韩美女av二区三区四区| 91偷拍与自偷拍亚洲精品86 | 日韩a无v码在线播放| 国产成人福利在线视频不卡| 中文字幕亚洲一区二区三区| 久久99热狠狠色精品一区| 久久久国产精品麻豆| 国产亚洲一区二区三区三州| 日韩av一区二区网址| 乱人伦中文无码视频在线观看| 久久久精品电影| 免费观看日本一区二区三区| 热re99久久精品国99热| 1000部拍拍拍18勿入免费视频下载 | 新视觉亚洲三区二区一区理伦 | 亚洲精品成人片在线观看精品字幕| 东北无码熟妇人妻AV在线| 亚洲精品一区二区三区国产| 色大全全免费网站久久 |