Evaluation of Resource Exhaustion Attacks against Wireless Mobile Devices
Currently, energy resource exhaustion attacks targeted on modern autonomously working mobile devices are becoming more and more important. The underdevelopment of specialized defenses against energy exhaustion attacks as well as their often hidden nature for the owner of the target device determine...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2019-05-01
|
Series: | Electronics |
Subjects: | |
Online Access: | https://www.mdpi.com/2079-9292/8/5/500 |
id |
doaj-83e369f064d047f7bad5d68f2fa1fa1a |
---|---|
record_format |
Article |
spelling |
doaj-83e369f064d047f7bad5d68f2fa1fa1a2020-11-24T21:49:00ZengMDPI AGElectronics2079-92922019-05-018550010.3390/electronics8050500electronics8050500Evaluation of Resource Exhaustion Attacks against Wireless Mobile DevicesVasily Desnitsky0Igor Kotenko1Danil Zakoldaev2Laboratory of Computer Security Problems, The Saint-Petersburg Institute for Informatics and Automation of the Russian Academy of Sciences (SPIIRAS), 39, 14 Liniya, 199178 St. Petersburg, RussiaLaboratory of Computer Security Problems, The Saint-Petersburg Institute for Informatics and Automation of the Russian Academy of Sciences (SPIIRAS), 39, 14 Liniya, 199178 St. Petersburg, RussiaInternational Laboratory of Information Security of Cyber-physical Systems, The Saint-Petersburg National Research University of Information Technologies, Mechanics and Optics (ITMO University), 49, Kronverksky Prospect, 197101 St. Petersburg, RussiaCurrently, energy resource exhaustion attacks targeted on modern autonomously working mobile devices are becoming more and more important. The underdevelopment of specialized defenses against energy exhaustion attacks as well as their often hidden nature for the owner of the target device determine a necessity of an integrated approach to modeling and evaluation of this class of attacks and various types of intruders. The paper analyzes conditions of applicability of energy resource exhaustion attacks performed by various classes of intruders, models them on physical implementations of devices for two application areas, and calculates their performance indicators. Application areas are a TCP/IP network of end-user mobile devices and a self-organizing mesh network designed for operational management and emergency response.https://www.mdpi.com/2079-9292/8/5/500cyber-physical securityenergy exhaustion attacksdenial-of-sleepmodeling and simulation |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Vasily Desnitsky Igor Kotenko Danil Zakoldaev |
spellingShingle |
Vasily Desnitsky Igor Kotenko Danil Zakoldaev Evaluation of Resource Exhaustion Attacks against Wireless Mobile Devices Electronics cyber-physical security energy exhaustion attacks denial-of-sleep modeling and simulation |
author_facet |
Vasily Desnitsky Igor Kotenko Danil Zakoldaev |
author_sort |
Vasily Desnitsky |
title |
Evaluation of Resource Exhaustion Attacks against Wireless Mobile Devices |
title_short |
Evaluation of Resource Exhaustion Attacks against Wireless Mobile Devices |
title_full |
Evaluation of Resource Exhaustion Attacks against Wireless Mobile Devices |
title_fullStr |
Evaluation of Resource Exhaustion Attacks against Wireless Mobile Devices |
title_full_unstemmed |
Evaluation of Resource Exhaustion Attacks against Wireless Mobile Devices |
title_sort |
evaluation of resource exhaustion attacks against wireless mobile devices |
publisher |
MDPI AG |
series |
Electronics |
issn |
2079-9292 |
publishDate |
2019-05-01 |
description |
Currently, energy resource exhaustion attacks targeted on modern autonomously working mobile devices are becoming more and more important. The underdevelopment of specialized defenses against energy exhaustion attacks as well as their often hidden nature for the owner of the target device determine a necessity of an integrated approach to modeling and evaluation of this class of attacks and various types of intruders. The paper analyzes conditions of applicability of energy resource exhaustion attacks performed by various classes of intruders, models them on physical implementations of devices for two application areas, and calculates their performance indicators. Application areas are a TCP/IP network of end-user mobile devices and a self-organizing mesh network designed for operational management and emergency response. |
topic |
cyber-physical security energy exhaustion attacks denial-of-sleep modeling and simulation |
url |
https://www.mdpi.com/2079-9292/8/5/500 |
work_keys_str_mv |
AT vasilydesnitsky evaluationofresourceexhaustionattacksagainstwirelessmobiledevices AT igorkotenko evaluationofresourceexhaustionattacksagainstwirelessmobiledevices AT danilzakoldaev evaluationofresourceexhaustionattacksagainstwirelessmobiledevices |
_version_ |
1725890088138702848 |