Evaluation of Resource Exhaustion Attacks against Wireless Mobile Devices

Currently, energy resource exhaustion attacks targeted on modern autonomously working mobile devices are becoming more and more important. The underdevelopment of specialized defenses against energy exhaustion attacks as well as their often hidden nature for the owner of the target device determine...

Full description

Bibliographic Details
Main Authors: Vasily Desnitsky, Igor Kotenko, Danil Zakoldaev
Format: Article
Language:English
Published: MDPI AG 2019-05-01
Series:Electronics
Subjects:
Online Access:https://www.mdpi.com/2079-9292/8/5/500
id doaj-83e369f064d047f7bad5d68f2fa1fa1a
record_format Article
spelling doaj-83e369f064d047f7bad5d68f2fa1fa1a2020-11-24T21:49:00ZengMDPI AGElectronics2079-92922019-05-018550010.3390/electronics8050500electronics8050500Evaluation of Resource Exhaustion Attacks against Wireless Mobile DevicesVasily Desnitsky0Igor Kotenko1Danil Zakoldaev2Laboratory of Computer Security Problems, The Saint-Petersburg Institute for Informatics and Automation of the Russian Academy of Sciences (SPIIRAS), 39, 14 Liniya, 199178 St. Petersburg, RussiaLaboratory of Computer Security Problems, The Saint-Petersburg Institute for Informatics and Automation of the Russian Academy of Sciences (SPIIRAS), 39, 14 Liniya, 199178 St. Petersburg, RussiaInternational Laboratory of Information Security of Cyber-physical Systems, The Saint-Petersburg National Research University of Information Technologies, Mechanics and Optics (ITMO University), 49, Kronverksky Prospect, 197101 St. Petersburg, RussiaCurrently, energy resource exhaustion attacks targeted on modern autonomously working mobile devices are becoming more and more important. The underdevelopment of specialized defenses against energy exhaustion attacks as well as their often hidden nature for the owner of the target device determine a necessity of an integrated approach to modeling and evaluation of this class of attacks and various types of intruders. The paper analyzes conditions of applicability of energy resource exhaustion attacks performed by various classes of intruders, models them on physical implementations of devices for two application areas, and calculates their performance indicators. Application areas are a TCP/IP network of end-user mobile devices and a self-organizing mesh network designed for operational management and emergency response.https://www.mdpi.com/2079-9292/8/5/500cyber-physical securityenergy exhaustion attacksdenial-of-sleepmodeling and simulation
collection DOAJ
language English
format Article
sources DOAJ
author Vasily Desnitsky
Igor Kotenko
Danil Zakoldaev
spellingShingle Vasily Desnitsky
Igor Kotenko
Danil Zakoldaev
Evaluation of Resource Exhaustion Attacks against Wireless Mobile Devices
Electronics
cyber-physical security
energy exhaustion attacks
denial-of-sleep
modeling and simulation
author_facet Vasily Desnitsky
Igor Kotenko
Danil Zakoldaev
author_sort Vasily Desnitsky
title Evaluation of Resource Exhaustion Attacks against Wireless Mobile Devices
title_short Evaluation of Resource Exhaustion Attacks against Wireless Mobile Devices
title_full Evaluation of Resource Exhaustion Attacks against Wireless Mobile Devices
title_fullStr Evaluation of Resource Exhaustion Attacks against Wireless Mobile Devices
title_full_unstemmed Evaluation of Resource Exhaustion Attacks against Wireless Mobile Devices
title_sort evaluation of resource exhaustion attacks against wireless mobile devices
publisher MDPI AG
series Electronics
issn 2079-9292
publishDate 2019-05-01
description Currently, energy resource exhaustion attacks targeted on modern autonomously working mobile devices are becoming more and more important. The underdevelopment of specialized defenses against energy exhaustion attacks as well as their often hidden nature for the owner of the target device determine a necessity of an integrated approach to modeling and evaluation of this class of attacks and various types of intruders. The paper analyzes conditions of applicability of energy resource exhaustion attacks performed by various classes of intruders, models them on physical implementations of devices for two application areas, and calculates their performance indicators. Application areas are a TCP/IP network of end-user mobile devices and a self-organizing mesh network designed for operational management and emergency response.
topic cyber-physical security
energy exhaustion attacks
denial-of-sleep
modeling and simulation
url https://www.mdpi.com/2079-9292/8/5/500
work_keys_str_mv AT vasilydesnitsky evaluationofresourceexhaustionattacksagainstwirelessmobiledevices
AT igorkotenko evaluationofresourceexhaustionattacksagainstwirelessmobiledevices
AT danilzakoldaev evaluationofresourceexhaustionattacksagainstwirelessmobiledevices
_version_ 1725890088138702848