Modeling and analysis of IoT energy resource exhaustion attacks

Citations of this article
Mendeley users who have this article in their library.

You may have access to this PDF.


Subjection of wireless Internet of Things (IoT) devices to energy resource exhaustion attacks gets increasing importance. Being stealthy enough for an attack target and systems of its monitoring such attacks are capable to exhaust energy of the device in a relatively short period and thereby impair the function and availability of the device. The paper analyzes possible types of ERE attacks, proposes an intruder model regarding this kind of attacks and provides experimental studies on the basis of a developed use case.




Desnitsky, V., & Kotenko, I. (2017). Modeling and analysis of IoT energy resource exhaustion attacks. Studies in Computational Intelligence, 737, 263–270.

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free