Modeling and analysis of IoT energy resource exhaustion attacks

8Citations
Citations of this article
5Readers
Mendeley users who have this article in their library.

You may have access to this PDF.

Abstract

Subjection of wireless Internet of Things (IoT) devices to energy resource exhaustion attacks gets increasing importance. Being stealthy enough for an attack target and systems of its monitoring such attacks are capable to exhaust energy of the device in a relatively short period and thereby impair the function and availability of the device. The paper analyzes possible types of ERE attacks, proposes an intruder model regarding this kind of attacks and provides experimental studies on the basis of a developed use case.

Cite

CITATION STYLE

APA

Desnitsky, V., & Kotenko, I. (2017). Modeling and analysis of IoT energy resource exhaustion attacks. Studies in Computational Intelligence, 737, 263–270. https://doi.org/10.1007/978-3-319-66379-1_23

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free