DocumentCode :
2678750
Title :
Denial-of-service attacks on battery-powered mobile computers
Author :
Martin, Thomas ; Hsiao, Michael ; Ha, Dong ; Krishnaswami, Jayan
Author_Institution :
Dept. of ECE, Virginia Tech., Blacksburg, VA, USA
fYear :
2004
fDate :
14-17 March 2004
Firstpage :
309
Lastpage :
318
Abstract :
Sleep deprivation attacks are a form of denial of service attack whereby an attacker renders a pervasive computing device inoperable by draining the battery more quickly than it would be drained under normal usage. We describe three main methods for an attacker to drain the battery: (1) service request power attacks, where repeated requests are made to the victim for services, typically over a network - even if the service is not provided the victim must expend energy deciding whether or not to honor the request; (2) benign power attacks, where the victim is made to execute a valid but energy-hungry task repeatedly, and (3) malignant power attacks, where the attacker modifies or creates an executable to make the system consume more energy than it would otherwise. Our initial results demonstrate the increased power consumption due to these attacks, which we believe are the first real examples of these attacks to appear in the literature. We also propose a power-secure architecture to thwart these power attacks by employing multi-level authentication and energy signatures.
Keywords :
cryptography; message authentication; mobile computing; power supplies to apparatus; battery-powered mobile computers; benign power attacks; denial-of-service attacks; energy signatures; energy-hungry task; malignant power attacks; multilevel authentication; pervasive computing device; power consumption; power-secure architecture; repeated requests; service request power attacks; sleep deprivation attacks; Batteries; Cancer; Computer architecture; Computer crime; Energy consumption; Mobile computing; Pervasive computing; Power system protection; Sleep; Wearable computers;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Pervasive Computing and Communications, 2004. PerCom 2004. Proceedings of the Second IEEE Annual Conference on
Print_ISBN :
0-7695-2090-1
Type :
conf
DOI :
10.1109/PERCOM.2004.1276868
Filename :
1276868
Link To Document :
بازگشت