论文标题
在物联网网络中针对边缘计算节点的电池排出攻击
Battery draining attacks against edge computing nodes in IoT networks
论文作者
论文摘要
许多物联网设备,尤其是部署在网络边缘的设备具有有限的功率资源。许多攻击旨在耗尽这些资源并排出此类边缘节点的电池。在这项工作中,我们研究了针对边缘节点的各种电池排出攻击的影响。通过模拟,我们阐明了此类攻击能够增加用法的程度,从而浪费边缘节点的功率资源。具体来说,我们在Contikios中实施Hello洪水,数据包洪水,选择性转发,排名攻击和版本攻击,并在Cooja Simulator中模拟它们,并测量和报告许多时间和电源资源使用指标,包括CPU时间,低功率模式时间,TX/RX时间和电池消耗。此外,我们用三个不同的电池测试了拉伸攻击,作为极端情况。我们的广泛测量使我们能够比较这些攻击的有效性。我们的结果表明,在耗尽网络的功率资源方面,版本攻击是最严重的攻击,其次是数据包洪水和Hello洪水攻击。此外,我们确认选择性转发和排名攻击无法大大增加场景中的功率资源使用情况。通过量化这些攻击的效果,我们证明在特定方案下,浪费网络资源时的版本攻击的效果可能是数据包洪水和Hello洪水攻击的三到四倍,而数据包洪水通常与CPU和TX TIME使用中的Hello Flood相当,但在排干设备电池中的功能是强大的两倍。
Many IoT devices, especially those deployed at the network edge have limited power resources. A number of attacks aim to exhaust these resources and drain the batteries of such edge nodes. In this work, we study the effects of a variety of battery draining attacks against edge nodes. Through simulation, we clarify the extent to which such attacks are able to increase the usage and hence waste the power resources of edge nodes. Specifically, we implement hello flooding, packet flooding, selective forwarding, rank attack, and versioning attack in ContikiOS and simulate them in the Cooja simulator, and measure and report a number of time and power resource usage metrics including CPU time, low power mode time, TX/RX time, and battery consumption. Besides, we test the stretch attack with three different batteries as an extreme scenario. Our extensive measurements enable us to compare the effectiveness of these attacks. Our results show that Versioning attack is the most severe attack in terms of draining the power resources of the network, followed by Packet Flooding and Hello Flood attacks. Furthermore, we confirm that Selective Forwarding and Rank attacks are not able to considerably increase the power resource usage in our scenarios. By quantifying the effects of these attacks, we demonstrate that under specific scenarios, Versioning attack can be three to four times as effective as Packet Flooding and Hello Flood attacks in wasting network resources, while Packet Flooding is generally comparable to Hello Flood in CPU and TX time usage increase but twice as powerful in draining device batteries.