DOI QR코드

DOI QR Code

Adaptive Filtering Scheme for Defense of Energy Consumption Attacks against Wireless Computing Devices

  • Lee, Wan Yeon (Dept. of Computer Science, Dongduk Women's University)
  • Received : 2018.08.10
  • Accepted : 2018.08.22
  • Published : 2018.09.30

Abstract

In this paper, we propose an adaptive filtering scheme of connection requests for the defense of malicious energy consumption attacks against wireless computing devices with limited energy budget. The energy consumption attack tries to consume the battery energy of a wireless device with repeated connection requests and shut down the wireless device by exhausting its energy budget. The proposed scheme blocks a connection request of the energy consumption attack in the middle, if the same connection request is repeated and its request result is failed continuously. In order to avoid the blocking of innocuous mistakes of normal users, the scheme gives another chance to allow connection request after a fixed blocking time. The scheme changes the blocking time adaptively by comparing the message arriving ate during non-blocking period and that during blocking period. Evaluation shows that the proposed defense scheme saves up to 94% energy consumption compared to the non-defense case.

Keywords

References

  1. Thomas Wollinger, Jorge Guajardo and Christof Paar, "Cryptography in Embedded Systems: An Overview," Proceedings of the Embedded World Exhibition and Conference (Feb. 2003), pp. 735-744.
  2. Wei Jiang, Zhenlin Guo, Yue Ma and Nan Sang, "Research on Cryptographic Algorithms for Embedded Real-time Systems: A Perspective of Measurement-Based Analysis," IEEE 14th International Conference on High Performance Computing and Communications (Jun. 2012), pp. 1495-1501.
  3. Meikang Qiu, Wenzhong Gao, Min Chen, Jian-Wei Niu and Lei Zhang, "Energy Efficient Security Algorithm for Power Grid Wide Area Monitoring System," IEEE Transactions on Smart Grid (Dec. 2011), vol. 2, no. 4, pp. 715-723. DOI: http://10.1109/TSG.2011.2160298
  4. Wan Yeon Lee, "Energy-efficient Scheduling of Periodic Real-time Tasks on Lightly Loaded Multicore Processors," IEEE Transactions on Parallel and Distributed Systems (Mar. 2012), vol. 23, no. 3, pp. 530-537. DOI: http://10.1109/TPDS.2011.87
  5. Eduardo Cuervo, Aruna Balasubramanian and Dae-ki Cho, "MAUI: Making Smartphones Last Longer with Code Offload," Proceedings of the 8th International Conference on Mobile Systems, Applications, and Services (Jun. 2010), pp. 49-62.
  6. G. Wang, W. Li and X. Hei, "Energy-Aware Real-time Scheduling on Heterogeneous Multi-Processor," Annual Conference on Information Sciences and Systems (Mar. 2015), pp. 1-7.
  7. R. Smith, C. Estan and S. Jha, "Backtracking Algorithmic Complexity Attack against a NIDS," The 22nd Annual Computer Security Applications Conference (Dec. 2006), pp. 89-98.
  8. S. Khan and I. Traore, "A Prevention Model for Algorithmic Complexity Attacks," The 2nd International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (July 2005), pp. 160-173.
  9. Qiang Huang, Hisashi Kobayashi, Bede Liu, Daqing Gu and Jinyun Zhang, "Energy/Security Scalable Mobile Cryptosystem," TR-2003-79, MERL - A Mitsubishi Electrical Research Laboratory (Feb. 2004), http://www.merl.com.
  10. Wan Yeon Lee, Yun-Seok Choi, "Optimization of ARIA Block-Cipher Algorithm on Embedded Systems with 16-bits Processors," International Journal of Internet, Broadcasting and Communication, vol. 8, no. 1, pp. 88-98, Feb. 2016. DOI: http://dx.doi.org/10.7236/IJIBC.2016.8.1.42