Energy depletion attacks in low power wireless networks

63Citations
Citations of this article
48Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

Low Power Wireless (LPW) networks have recently been emerging as key candidates to offer affordable connectivity for the constrained devices in the Internet of Things (IoT). However, they also raise major security concerns due to the inherent security vulnerabilities of built-in communication protocols. By exploiting these flaws, an adversary can attack sensors or actuators in an LPW network and force them to execute energy-hungry tasks such as verifying unauthenticated garbage messages repeatedly. This attack, namely energy depletion attack (EDA), can drain the batteries of the devices rapidly and lead to soaring network-wide energy expenditure. Consequently, the offense can leave the victims disabled, and even shut down the whole network due to the battery exhaustion of all the devices. In this paper, we investigate existing studies and provide a systematic review of EDAs and defenses in LPW networks. Through this work, we conclude that most existing LPW technologies are vulnerable to EDAs. This paper also indicates the security challenges in LPW networks related to EDAs along with the potential research directions. While LPW technologies have already hit the market with the promising deployment schedules, our attempt can inspire the research community to enhance the security of underlying protocols that will shape the connectivity of billions of devices in the future IoT ecosystem.

Cite

CITATION STYLE

APA

Nguyen, V. L., Lin, P. C., & Hwang, R. H. (2019). Energy depletion attacks in low power wireless networks. IEEE Access, 7, 51915–51932. https://doi.org/10.1109/ACCESS.2019.2911424

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free