[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
research-article

Power-Positive Networking: Wireless-Charging-Based Networking to Protect Energy against Battery DoS Attacks

Published: 17 May 2019 Publication History

Abstract

Energy is required for networking and computation and is a valuable resource for unplugged systems such as mobile, sensor, and embedded systems. Energy denial-of-service (DoS) attack where a remote attacker exhausts the victim’s battery via networking remains a critical challenge for the device availability. While prior literature proposes mitigation- and detection-based solutions, we propose to eliminate the vulnerability entirely by offloading the power requirements to the entity who makes the networking requests. To do so, we build communication channels using wireless charging signals (as opposed to the traditional radio-frequency signals), so that the communication and the power transfer are simultaneous and inseparable, and use the channels to build power-positive networking (PPN). PPN also offloads the computation-based costs to the requester, enabling authentication and other tasks considered too power-hungry for battery-operated devices. In this article, we study the energy DoS attack impacts on off-the-shelf embedded system platforms (Raspberry Pi and the ESP 8266 system-on-chip (SoC) module), present PPN, implement and build a Qi-charging-technology-compatible prototype, and use the prototype for evaluations and analyses. Our prototype, built on the hardware already available for wireless charging, effectively defends against energy DoS and supports simultaneous power and data transfer.

References

[1]
Sang-Yoon Chang, Sristi Lakshmi Sravana Kumar, Bao Anh N. Tran, Sreejaya Viswanathan, Younghee Park, and Yih-Chun Hu. 2017. Power-positive networking using wireless charging: Protecting energy against battery exhaustion attacks. In Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec’17). ACM, New York, NY, 52--57.
[2]
S. Saxena, G. Sanchez, and M. Pecht. 2017. Batteries in portable electronic devices: A user’s perspective. IEEE Ind. Electron. Mag. 11, 2 (June 2017), 35--44.
[3]
Susanne Rothgang, Thorsten Baumhöfer, Hauke van Hoek, Tobias Lange, Rik W. de Doncker, and Dirk Uwe Sauer. 2014. Modular battery design for reliable, flexible and multi-technology energy storage systems. Appl. Energy 137, 1 (2014), 931--937.
[4]
T. P. J. Crompton. 2000. Battery Reference Book. Elsevier Science. https://books.google.com/books?id=QmVR7qiB5AUC.
[5]
Frank Stajano and Ross J. Anderson. 2000. The resurrecting duckling: Security issues for ad-hoc wireless networks. In Proceedings of the 7th International Workshop on Security Protocols. Springer-Verlag, London, UK, 172--194. http://dl.acm.org/citation.cfm?id=647217.760118
[6]
D. Halperin, T. S. Heydt-Benjamin, B. Ransford, S. S. Clark, B. Defend, W. Morgan, K. Fu, T. Kohno, and W. H. Maisel. 2008. Pacemakers and implantable cardiac defibrillators: Software radio attacks and zero-power defenses. In 2008 IEEE Symposium on Security and Privacy (SP’08). 129--142.
[7]
Justin Manweiler and Romit Roy Choudhury. 2011. Avoiding the rush hours: WiFi energy management via traffic isolation. In Proceedings of the 9th International Conference on Mobile Systems, Applications, and Services (MobiSys’11). ACM, New York, NY, 253--266.
[8]
X. Zhang and K. G. Shin. 2012. E-MiLi: Energy-minimizing idle listening in wireless networks. IEEE Trans. Mob. Comput. 11, 9 (Sept. 2012), 1441--1454.
[9]
Girisha De Silva, Binbin Chen, and Mun Choon Chan. 2016. Collaborative cellular tail energy reduction: Feasibility and fairness. In Proceedings of the 17th International Conference on Distributed Computing and Networking (ICDCN’16). ACM, New York, NY, Article 25, 10 pages.
[10]
S. Y. Chang and Y. C. Hu. 2017. SecureMAC: Securing wireless medium access control against insider denial-of-service attacks. IEEE Trans. Mob. Comput. 16, 12 (Dec. 2017), 3527--3540.
[11]
Nico Golde, Kevin Redon, and Jean-Pierre Seifert. 2013. Let me answer that for you: Exploiting broadcast information in cellular networks. In Proceedings of the 22nd USENIX Security Symposium (USENIX Security 13). USENIX, Washington, D.C., 33--48. https://www.usenix.org/conference/usenixsecurity13/technical-sessions/presentation/golde.
[12]
S. Y. Chang, Y. C. Hu, and Z. Liu. 2015. Securing wireless medium access control against insider denial-of-service attackers. In 2015 IEEE Conference on Communications and Network Security (CNS’15). 370--378.
[13]
X. Wei, Q. Wang, T. Wang, and J. Fan. 2017. Jammer localization in multi-hop wireless network: A comprehensive survey. IEEE Commun. Surv. Tutorials 19, 2 (2017), 765--799.
[14]
Sang-Yoon Chang, Yih-Chun Hu, and Nicola Laurenti. 2012. SimpleMAC: A jamming-resilient MAC-layer protocol for wireless channel coordination. In Proceedings of the 18th Annual International Conference on Mobile Computing and Networking (Mobicom’12). ACM, New York, NY, 77--88.
[15]
Triet Dang Vo-Huu, Tien Dang Vo-Huu, and Guevara Noubir. 2016. Interleaving jamming in wi-fi networks. In Proceedings of the 9th ACM Conference on Security 8 Privacy in Wireless and Mobile Networks (WiSec’16). ACM, New York, NY, 31--42.
[16]
Subhash Lakshminarayana, Jabir Shabbir Karachiwala, Sang-Yoon Chang, Girish Revadigar, Sristi Lakshmi Sravana Kumar, David K. Y. Yau, and Yih-Chun Hu. 2018. Signal jamming attacks against communication-based train control: Attack impact and countermeasure. In Proceedings of the 11th ACM Conference on Security 8 Privacy in Wireless and Mobile Networks (WiSec’18). ACM, New York, NY, 160--171.
[17]
S. Slijepcevic, M. Potkonjak, V. Tsiatsis, S. Zimbeck, and M. B. Srivastava. 2002. On communication security in wireless ad-hoc sensor networks. In Proceedings of the 11th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE’02). 139--144.
[18]
Thomas Martin, Michael Hsiao, Dong Ha, and Jayan Krishnaswami. 2004. Denial-of-service attacks on battery-powered mobile computers. In Proceedings of the 2nd IEEE International Conference on Pervasive Computing and Communications (PERCOM’04). IEEE Computer Society, Washington, D.C., 309--318. http://dl.acm.org/citation.cfm?id=977406.978701
[19]
R. Anderson, Haowen Chan, and A. Perrig. 2004. Key infection: Smart trust for smart dust. In Proceedings of the 12th IEEE International Conference on Network Protocols (ICNP’04). 206--215.
[20]
T. K. Buennemeyer, M. Gora, R. C. Marchany, and J. G. Tront. 2007. Battery exhaustion attack detection with small handheld mobile computers. In IEEE International Conference on Portable Information Devices (PORTABLE’07). 1--5.
[21]
Alessio Merlo, Mauro Migliardi, and Luca Caviglione. 2015. A survey on energy-aware security mechanisms. Pervasive Mob. Comput. 24 (2015), 77--90. Special Issue on Secure Ubiquitous Computing.
[22]
Hahnsang Kim, Joshua Smith, and Kang G. Shin. 2008. Detecting energy-greedy anomalies and mobile malware variants. In Proceedings of the 6th International Conference on Mobile Systems, Applications, and Services (MobiSys’08). ACM, New York, NY, 239--252.
[23]
Xiao Ma, Peng Huang, Xinxin Jin, Pei Wang, Soyeon Park, Dongcai Shen, Yuanyuan Zhou, Lawrence K. Saul, and Geoffrey M. Voelker. 2013. eDoctor: Automatically diagnosing abnormal battery drain issues on smartphones. In Proceedings of the 10th USENIX Symposium on Networked Systems Design and Implementation (NSDI’13). USENIX, Lombard, IL, 57--70. https://www.usenix.org/conference/nsdi13/technical-sessions/presentation/ma.
[24]
Peng Huang, Tianyin Xu, Xinxin Jin, and Yuanyuan Zhou. 2016. DefDroid: Towards a more defensive mobile os against disruptive app behavior. In Proceedings of the 14th Annual International Conference on Mobile Systems, Applications, and Services (MobiSys’16). ACM, New York, NY, 221--234.
[25]
X. Gao, D. Liu, D. Liu, H. Wang, and A. Stavrou. 2017. E-Android: A new energy profiling tool for smartphones. In 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS’17). 492--502.
[26]
R. Falk and H. J. Hof. 2009. Fighting insomnia: A secure wake-up scheme for wireless sensor networks. In 3rd International Conference on Emerging Security Information, Systems, and Technologies (SECURWARE’09). 191--196.
[27]
M. Brownfield, Yatharth Gupta, and N. Davis. 2005. Wireless sensor network denial of sleep attack. In Proceedings of the 6th Annual IEEE SMC Information Assurance Workshop (IAW’05). 356--364.
[28]
D. Raymond, R. Marchany, M. Brownfield, and S. Midkiff. 2006. Effects of denial of sleep attacks on wireless sensor network MAC protocols. In 2006 IEEE Information Assurance Workshop. 297--304.
[29]
M. Keskilammi, L. Sydänheimo, and M. Kivikoski. 2003. Radio frequency technology for automated manufacturing and logistics control. part 1: Passive RFID systems and the effects of antenna parameters on operational distance. Int. J. Adv. Manuf. Technol. 21, 10 (2003), 769--774.
[30]
C. Zhou and J. D. Griffin. 2012. Accurate phase-based ranging measurements for backscatter RFID tags. IEEE Antennas Wirel. Propag. Lett. 11 (2012), 152--155.
[31]
Qi Chai and Guang Gong. 2012. BUPLE: Securing passive RFID communication through physical layer enhancements. In RFID. Security and Privacy, Ari Juels and Christof Paar (Eds.). Springer, Berlin, Germany, 127--146.
[32]
U. K. Madawala, J. Stichbury, and S. Walker. 2004. Contactless power transfer with two-way communication. In 30th Annual Conference of IEEE Industrial Electronics Society (IECON’04), Vol. 3. 3071--3075.
[33]
W. P. Choi, W. C. Ho, X. Liu, and S. Y. R. Hui. 2010. Bidirectional communication techniques for wireless battery charging systems 8 portable consumer electronics. In 2010 25th Annual IEEE Applied Power Electronics Conference and Exposition (APEC). 2251--2257.
[34]
J. Wu, C. Zhao, Z. Lin, J. Du, Y. Hu, and X. He. 2015. Wireless power and data transfer via a common inductive link using frequency division multiplexing. IEEE Trans. Ind. Electron. 62, 12 (2015), 7810--7820.
[35]
D. van Wageningen and T. Staring. 2010. The Qi wireless power standard. In 2010 14th International Power Electronics and Motion Control Conference (EPE/PEMC). S15--25--S15--32.
[36]
Wireless Power Consortium. 2013. Qi System Description, version 1.1.2. Technical Report.
[37]
Xiang Gao. 2013. Demodulating Communication Signals of Qi-Compliant Low-Power Wireless Charger Using MC56F8006 DSC. Technical Report. Freescale Semiconductor.
[38]
Jouya Jadidian and Dina Katabi. 2014. Magnetic MIMO: How to charge your phone in your pocket. In Proceedings of the 20th Annual International Conference on Mobile Computing and Networking (MobiCom’14). ACM, New York, NY, 495--506.
[39]
Lixin Shi, Zachary Kabelac, Dina Katabi, and David Perreault. 2015. Wireless power hotspot that charges all of your devices. In Proceedings of the 21st Annual International Conference on Mobile Computing and Networking (MobiCom’15). ACM, New York, NY, 2--13.
[40]
B. H. Waters, B. J. Mahoney, V. Ranganathan, and J. R. Smith. 2015. Power delivery and leakage field control using an adaptive phased array wireless power system. IEEE Trans. Power Electron. 30, 11 (Nov. 2015), 6298--6309.
[41]
Andre Kurs, Aristeidis Karalis, Robert Moffatt, J. D. Joannopoulos, Peter Fisher, and Marin Soljacic. 2007. Wireless power transfer via strongly coupled magnetic resonances. Sci. 317, 5834 (July 2007), 83--86.
[42]
S. Y. Chang, S. Kumar, and Y. C. Hu. 2017. Cognitive wireless charger: Sensing-based real-time frequency control for near-field wireless charging. In IEEE International Conference on Distributed Computing Systems (ICDCS’17). 2302--2307.
[43]
Benjamin H. Waters, Alanson P. Sample, and Joshua R. Smith. 2012. Adaptive impedance matching for magnetically coupled resonators. In Progress in Electromagnetics Research Symposium. 694--701.
[44]
S. O’Driscoll, A. S. Y. Poon, and T. H. Meng. 2009. A mm-sized implantable power receiver with adaptive link compensation. In IEEE International Solid-State Circuits Conference—Digest of Technical Papers. 294--295.
[45]
D. W. Baarman, S. J. McPhilliamy, and C. Houghton. 2006. Inductively powered apparatus. Retrieved from https://www.google.com/patents/US7118240. US Patent 7,118,240.
[46]
K. W. Lee, Y. S. Kim, K. H. Byun, and S. K. YEO. 2015. Method for controlling charging power and wireless charging apparatus for the same. Retrieved from https://www.google.com/patents/US9048683. US Patent 9,048,683.
[47]
Vamsi Talla, Bryce Kellogg, Benjamin Ransford, Saman Naderiparizi, Shyamnath Gollakota, and Joshua R. Smith. 2015. Powering the next billion devices with Wi-Fi. Arxiv Preprint Arxiv:1505.06815 (2015).
[48]
R. Vyas, H. Nishimoto, M. Tentzeris, Y. Kawahara, and T. Asami. 2012. A battery-less, energy harvesting device for long range scavenging of wireless power from terrestrial TV broadcasts. In 2012 IEEE MTT-S International Microwave Symposium Digest (MTT). 1--3.
[49]
Joshua R. Smith, Alanson P. Sample, Pauline S. Powledge, Sumit Roy, and Alexander Mamishev. 2006. A wirelessly-powered platform for sensing and computation. In Proceedings of the 8th International Conference on Ubiquitous Computing (UbiComp’06). Springer-Verlag, Berlin, Germany, 495--506.
[50]
Hee-Jin Chae, Mastooreh Salajegheh, Daniel J. Yeager, Joshua R. Smith, and Kevin Fu. 2013. Maximalist Cryptography and Computation on the WISP UHF RFID Tag. Springer, New York, NY, 175--187.
[51]
John Perzow. 2015. Measuring wireless charging efficiency in the real world. WPC Trade Conference (November 2015). Retrieved from https://www.wirelesspowerconsortium.com/data/downloadables/1/5/2/7/john-perzow-efficiency-of-wireless-charging.pdf.
[52]
Rhett Allain. 2015. Wi-Fi charging works, but it can’t really power your phone. Wired (June 2015). Retrieved from http://www.wired.com/2015/06/power-wifi-isnt-think/.
[53]
J. Nadakuduti, Lin Lu, and P. Guckian. 2013. Operating frequency selection for loosely coupled wireless power transfer systems with respect to RF emissions and RF exposure requirements. In Wireless Power Transfer (WPT), 2013 IEEE. 234--237.
[54]
WiTricity. 2012. Highly Resonant Wireless Power Transfer: Safe, Efficient, and Over Distance. Technical Report.
[55]
M. Healy, T. Newe, and E. Lewis. 2009. Security for wireless sensor networks: A review. In IEEE Sensors Applications Symposium (SAS’09). 80--85.
[56]
M. Kaur and S. Singh. 2015. A study on networking techniques of WBAN system. Int. Res. Eng. Technol. (IRJET) 2, 9 (2015), 80--85.
[57]
Bryce Kellogg, Vamsi Talla, Shyamnath Gollakota, and Joshua R. Smith. 2016. Passive Wi-Fi: Bringing low power to wi-fi transmissions. In 13th USENIX Symposium on Networked Systems Design and Implementation (NSDI’16). USENIX Association, Santa Clara, CA, 151--164. https://www.usenix.org/conference/nsdi16/technical-sessions/presentation/kellogg.
[58]
Noboru Kamijoh, Tadanobu Inoue, C. Michael Olsen, M. T. Raghunath, and Chandra Narayanaswami. 2001. Energy trade-offs in the IBM wristwatch computer. In Proceedings of the 5th IEEE International Symposium on Wearable Computers (ISWC’01). IEEE Computer Society, Washington, D.C., 133--. http://dl.acm.org/citation.cfm?id=580581.856575
[59]
N. Tesla. 1914. Apparatus for transmitting electrical energy. Retrieved from http://www.google.com/patents/US1119732. US Patent 1,119,732.

Cited By

View all
  • (2023)Securing UAV Flying Base Station for Mobile Networking: A ReviewFuture Internet10.3390/fi1505017615:5(176)Online publication date: 9-May-2023
  • (2023)Achieving efficient energy-aware security in IoT networks: a survey of recent solutions and research challengesWireless Networks10.1007/s11276-022-03170-y29:2(787-808)Online publication date: 1-Feb-2023
  • (2022)Reliability of linear WSNs: A complementary overview and analysis of impact of cascaded failures on network lifetimeAd Hoc Networks10.1016/j.adhoc.2022.102839131(102839)Online publication date: Jun-2022
  • Show More Cited By

Index Terms

  1. Power-Positive Networking: Wireless-Charging-Based Networking to Protect Energy against Battery DoS Attacks

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Transactions on Sensor Networks
    ACM Transactions on Sensor Networks  Volume 15, Issue 3
    August 2019
    324 pages
    ISSN:1550-4859
    EISSN:1550-4867
    DOI:10.1145/3335317
    Issue’s Table of Contents
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Journal Family

    Publication History

    Published: 17 May 2019
    Accepted: 01 February 2019
    Revised: 01 February 2019
    Received: 01 July 2018
    Published in TOSN Volume 15, Issue 3

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Internet of Things
    2. Wireless networking
    3. battery exhaustion attack
    4. denial-of-service
    5. wireless charging

    Qualifiers

    • Research-article
    • Research
    • Refereed

    Funding Sources

    • Agency for Science, Technology and Research (A*STAR)

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)32
    • Downloads (Last 6 weeks)1
    Reflects downloads up to 02 Mar 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2023)Securing UAV Flying Base Station for Mobile Networking: A ReviewFuture Internet10.3390/fi1505017615:5(176)Online publication date: 9-May-2023
    • (2023)Achieving efficient energy-aware security in IoT networks: a survey of recent solutions and research challengesWireless Networks10.1007/s11276-022-03170-y29:2(787-808)Online publication date: 1-Feb-2023
    • (2022)Reliability of linear WSNs: A complementary overview and analysis of impact of cascaded failures on network lifetimeAd Hoc Networks10.1016/j.adhoc.2022.102839131(102839)Online publication date: Jun-2022
    • (2022)Towards Securing Availability in 5G: Analyzing the Injection Attack Impact on Core NetworkSilicon Valley Cybersecurity Conference10.1007/978-3-030-96057-5_10(143-154)Online publication date: 10-Feb-2022
    • (2021)An Efficient and Secure Certificate-Based Access Control and Key Agreement Scheme for Flying Ad-Hoc NetworksIEEE Transactions on Vehicular Technology10.1109/TVT.2021.305589570:5(4839-4851)Online publication date: May-2021
    • (2020)Energy Harvesting towards Self-Powered IoT DevicesEnergies10.3390/en1321552813:21(5528)Online publication date: 22-Oct-2020
    • (2020)Phantom Eavesdropping With Whitened RF LeakageIEEE Wireless Communications Letters10.1109/LWC.2019.29493169:2(232-235)Online publication date: Feb-2020
    • (2020)A Theil Index-Based Countermeasure Against Advanced Vampire Attack in Internet of Things2020 IEEE 21st International Conference on High Performance Switching and Routing (HPSR)10.1109/HPSR48589.2020.9098987(1-6)Online publication date: May-2020
    • (2020)Security in Energy Harvesting Networks: A Survey of Current Solutions and Research ChallengesIEEE Communications Surveys & Tutorials10.1109/COMST.2020.301766522:4(2658-2693)Online publication date: Dec-2021
    • (2020)RETRACTED ARTICLE: Enhancement of security using optimized DoS (denial-of-service) detection algorithm for wireless sensor networkSoft Computing - A Fusion of Foundations, Methodologies and Applications10.1007/s00500-019-04573-424:14(10681-10691)Online publication date: 1-Jul-2020

    View Options

    Login options

    Full Access

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format.

    HTML Format

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media