HARPAGON: An Energy Management Framework for Attacks in IoT Networks (original) (raw)

Modeling the impact of jamming attacks in the internet of things

Indonesian Journal of Electrical Engineering and Computer Science, 2022

Security is a key requirement in the context of the internet of things (IoT). The IoT is connecting many objects together via wireless and wired connections with the goal of allowing ubiquitous interaction, where all components may communicate with others without constraints. The wireless sensor network is one of the most essential elements of IoT concepts. Because of their unattended and radio-shared nature for communication, security is becoming an important issue. Wireless sensor nodes are susceptible to different types of attacks. Such attacks can be carried out in several various ways. One of the most commonly utilized methods is jamming. However, there are also some other attack types that we need to be aware of, such as tampering, and wormhole. In this paper, we have provided an analysis of the layered IoT architecture. A detailed study of different types of jamming attacks, in a wireless sensor network, is presented. The packet loss rate, and energy consumption. are calculated, and the performance analysis of the wireless sensor network (WSN) system is achieved. The protocol chosen to evaluate the performance of the WSN is the sensor-medium access control (S-MAC) protocol. Different simulations are realized to evaluate the performance of a network attacked by the different types of jamming attacks.

Borrowing Arrows with Thatched Boats": The Art of Defeating Reactive Jammers in IoT Networks

IEEE Wireless Communications, 2020

In this article, we introduce a novel deception strategy which is inspired by the "Borrowing Arrows with Thatched Boats", one of the most famous military tactics in the history, in order to defeat reactive jamming attacks for low-power IoT networks. Our proposed strategy allows resource-constrained IoT devices to be able to defeat powerful reactive jammers by leveraging their own jamming signals. More specifically, by stimulating the jammer to attack the channel through transmitting fake transmissions, the IoT system can not only undermine the jammer's power, but also harvest energy or utilize jamming signals as a communication means to transmit data through using RF energy harvesting and ambient backscatter techniques, respectively. Furthermore, we develop a low-cost deep reinforcement learning framework that enables the hardware-constrained IoT device to quickly obtain an optimal defense policy without requiring any information about the jammer in advance. Simulation results reveal that our proposed framework can not only be very effective in defeating reactive jamming attacks, but also leverage jammer's power to enhance system performance for the IoT network. Index Terms IoT, jamming, ambient backscatter, RF energy harvesting, deception, MDP, and deep reinforcement learning. I. INTRODUCTION Over the last 10 years, we have witnessed an explosive growth of Internet-of-Things (IoT) applications with great influences in many sectors such as manufacturing, healthcare, smart cities, and industry 4.0 [1]. The development of IoT has brought great benefits to human life and opened many potential market opportunities for equipment manufacturers, Internet service providers and application developers.

A novel countermeasure technique for reactive jamming attack in internet of things

Multimedia Tools and Applications, 2018

In recent years, Internet of Things (IoT) has attracted significant attention because of its wide range of applications in various domains. However, security is a growing concern as users of small devices in an IoT network are unable to defend themselves against reactive jamming attacks. These attacks negatively affect the performance of devices and hinder IoT operations. To address such an issue, this paper presents a novel countermeasure detection and consistency algorithm (CDCA), which aims to fight reactive jamming attacks on IoT networks. The proposed CDCA uses a change in threshold value to detect and treat an attack. The algorithm employs channel signal strength to check packet consistency by determining if the data transmission value contradicts the threshold value. The node that sends the threshold value is periodically checked and the threshold value is compared with the current value after data transmission to find out if an attack has occurred in the network. Based on realistic simulation scenarios (e.g., with varying traffic interval, number of malicious nodes, and random mobility patterns), the performance of the proposed CDCA is evaluated using a Cooja simulator. Simulation results demonstrate the superiority of the proposed technique compared with contemporary schemes in terms of performance metrics such as energy consumption, traffic delay, and network throughput.

A Cooperative Smart Jamming Attack in Internet of Things Networks

2022

The emerging scope of the Internet-of-Things (IoT) has piqued the interest of industry and academia in recent times. Therefore, security becomes the main issue to prevent the possibility of cyberattacks. Jamming attacks are threads that can affect performance and cause significant problems for IoT device. This study explores a smart jamming attack (coalition attack) in which the attackers were previously a part of the legitimate network and are now back to attack it based on the gained knowledge. These attackers regroup into a coalition and begin exchanging information about the legitimate network to launch attacks based on the gained knowledge. Our system enables jammer nodes to select the optimal transmission rates for attacks based on the attack probability table, which contains the most probable link transmission rate between nodes in the legitimate network. The table is updated constantly throughout the life cycle of the coalition. The simulation results show that a coalition of jammers can cause highly successful attacks.

Novel model for boosting security strength and energy efficiency in internet-of-things using multi-staged game

International Journal of Electrical and Computer Engineering (IJECE), 2019

Security as well as energy efficiency is one of the most inevitable and challenging problems when it comes it large scale network deployment like INternet-of-Things (IoT). After reviewing existing research work on IoT, it was found that there are discrete set of solution for security as well as for energy. However, there is little research work that has jointly investigated both the problems with respect to IoT. Apart from this, there are also various form of attacks that cost energy of sensors that constitutes core physical devices in IoT. Therefore, these manuscripts present a novel idea for identifying and resisting the security breach within an IoT system ensuring energy efficiency too. Harnessing the modelling capability of game-theory, the proposed system offers a joint solution towards these problems. The simulated outcome of the study is found to offer balance performance for better energy efficiency and robust threat mitigation capability when compared with existing approaches. 1. INTRODUCTION Internet-of-Things (IoT) offers a large chain of connection among different forms of physical system that finally leads to a robust cyber-physical system [1]. Owing to formation of networking among different number of heterogeneous physical devices over various communication strategies, therefore, designing a generic security solution is not feasible in IoT. At present, the security system of IoT focuses on securing either application layer, or transportation layer, or perception layer [2]. There are also different review studies carried out towards addressing security protocols in IoT [3-7], however, there are various questions that are yet left unsolved from the approaches in existing security solution. The first question will be-is there any good alternative for strong encryption mechanism? The second question will be why the existing security solutions are so attack specific. Owing to the novel nature of the technology, answers to such question are yet to be explored. If this answers were ever found, than then next question will be why the researchers have not emphasized on their solution by considering energy factor. The IoT devices are usually wireless and low-powered hardware which cannot execute complex security protocols. Hence, existing attacks e.g. denial of service, Sybil attack, routing attack, as well as many other unknown attacks too cost the network resource as well as node battery just to resist it. Moreover, there are various types of attacks that are only meant for energy depletion [8]. Just like security problems, the problems associated with energy also exists at present. Recent review work e.g. [10] offers concrete information about different forms of energy efficiency techniques. But unfortunately, none of the existing studies on IoT have ever associated energy problems with security problems.

Mitigating Energy Depletion Attacks in IoT via Random Time-Slotted Channel Access

2021 IEEE Conference on Communications and Network Security (CNS), 2021

Energy depletion attacks represent a challenging threat towards the secure and reliable deployment of low-power Internet of Things (IoT) networks. Indeed, by simply transmitting canning standard-compliant packets to a target IoT device, an adversary can quickly exhaust target devices' available energy and reduce network lifetime, leading to extensive Denial-of-Service (DoS). Current solutions to tackle energy depletion attacks mainly rely on ex-post detection of the attack and the adoption of follow-up countermeasures. Still, the cited approaches cannot prevent external adversaries from sending wireless packets to target devices and draining down their energy budget. In this paper, we present RTSCA, a novel countermeasure to energy depletion attacks in IoT networks, that leverages Random Time-Slotted Channel Access. RTSCA randomizes channel access operations executed by a couple of directly-connected IoT devices operating through the IEEE 802.15.4 MAC, significantly reducing the time window of opportunity for the attacker, with littleto-none energy cost on legitimate IoT devices. RTSCA also includes a detection mechanism targeted to the recently-introduced Truncate-after-Preamble (TaP) energy depletion attacks, that leverages the observation of error patterns in the received packets. We carried out an extensive performance assessment campaign on real Openmote-b IoT nodes, showing that RTSCA forces the adversary to behave as a (sub-optimal) reactive jammer to achieve energy depletion attacks. In such a setting, the adversary has to spend between 42.5% and 55% more energy to carry out the attack, while at the same time having no deterministic chances of success.

Cyber-attack Mitigation and Impact Analysis for Low-power IoT Devices

2017 IEEE 7th Annual International Conference on CYBER Technology in Automation, Control, and Intelligent Systems (CYBER), 2017

Recent years have seen exponential development in wireless sensor devices and their rebirth as IoT, as well as increased popularity in wireless home devices such as bulbs, fans, and microwave. As they can be used in various fields such as medical devices, environmental studies, fire department or military application, etc., security of these low powered devices will always be a concern for all the user and security experts. Users nowadays want to control all these "smart" wireless home devices through their smartphones using an internet connection. Attacks such as distributed attacks on these devices will render the whole system vulnerable as these attacks can record and extract confidential information as well as increase resource (energy) consumption of the entire network. In this paper, we propose a cyber-attack detection algorithm and present an impact analysis of easy-to-launch cyber-attacks on a low-power mote (Z1 Zolertia) as a model IoT device. We also present detailed results of power consumption analysis with and without attack along with when the mitigation algorithm for intrusion detection is implemented.

An overview of DoSL Attacks in IoT Networks

International Journal of Scientific Research in Computer Science, Engineering and Information Technology, 2021

Many methodologies has been discovered to lower the power consumption in the devices, which is connected to the network in recent years. Many medium access control protocols have been used for low power lossy networks (LLNs).The major goal of introducing this methods is to improve the energy efficiency and to increase the fastness of the communication in the network or the data transmission. The Low power lossy networks is used in many real time scenarios nowadays. These methods use battery-powered devices, which makes transmission easier over lossy links. A particular node generally switches off radio interfaces when no traffic is sent. These devices are made to keep the radio interfaces in ON thus it makes exhausting of batteries causing Denial of sleep attacks. Here, we are going to use time division and channel hoping techniques to get a impact on jamming attacks. We will look on the impacts of such attacks by the ideas got through attacker and to which level the protection allows jamming attacks at upper layers.

Exploration of Various Attacks and Security Measures Related to the Internet of Things

Regular, 2020

In this era of technological advances, it will be impractical to think of a day without the usage of gadgets. Development and popularity of the Internet of Things have helped mankind a lot in several ways, but at the same time, there has also been an increase in attacks invading the underlying security. Advances in studies have resulted in the development of evolved algorithms that can be used in order to reduce the attacks and threats to the Internet of Things. With several advancements in studies and research works, the security measures on various Internet of Things based components and protocols are developing with time, but concurrently more advanced threats and attacks on these components are also evolving. These attacks are not only harmful to the components, but rather they also affect the users and applications that are associated with it, by breaching data, increase in inconsistency and inaccuracy, and many more. This work deals with the study of several attacks that are a...