{"title":"无线网络中的能量耗尽攻击","authors":"V. Shakhov, Insoo Koo, A. Rodionov","doi":"10.1109/SIBIRCON.2017.8109825","DOIUrl":null,"url":null,"abstract":"Security is the challenge that world community will need to overcome for the Internet of Things (IoT) comes true. It needs to protect IoT users from known and potential attacks. The traditional approach for security system design is expected to fail, because most threats in IoT environment will be previously unseen and many IoT devices have constrained computing resources. The recent surveys of intrusion detection systems in wireless sensor networks and IoT applications do not mention some novel attacks such as depletion of battery, denial of information etc. There is a lack of methods for comprehensive analysis of novel attacks. Thus, in the presented paper we consider a model of wireless network node behavior under energy exhaustion attacks.","PeriodicalId":135870,"journal":{"name":"2017 International Multi-Conference on Engineering, Computer and Information Sciences (SIBIRCON)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"11","resultStr":"{\"title\":\"Energy exhaustion attacks in wireless networks\",\"authors\":\"V. Shakhov, Insoo Koo, A. Rodionov\",\"doi\":\"10.1109/SIBIRCON.2017.8109825\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Security is the challenge that world community will need to overcome for the Internet of Things (IoT) comes true. It needs to protect IoT users from known and potential attacks. The traditional approach for security system design is expected to fail, because most threats in IoT environment will be previously unseen and many IoT devices have constrained computing resources. The recent surveys of intrusion detection systems in wireless sensor networks and IoT applications do not mention some novel attacks such as depletion of battery, denial of information etc. There is a lack of methods for comprehensive analysis of novel attacks. Thus, in the presented paper we consider a model of wireless network node behavior under energy exhaustion attacks.\",\"PeriodicalId\":135870,\"journal\":{\"name\":\"2017 International Multi-Conference on Engineering, Computer and Information Sciences (SIBIRCON)\",\"volume\":\"38 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-09-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"11\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 International Multi-Conference on Engineering, Computer and Information Sciences (SIBIRCON)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/SIBIRCON.2017.8109825\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 International Multi-Conference on Engineering, Computer and Information Sciences (SIBIRCON)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SIBIRCON.2017.8109825","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Security is the challenge that world community will need to overcome for the Internet of Things (IoT) comes true. It needs to protect IoT users from known and potential attacks. The traditional approach for security system design is expected to fail, because most threats in IoT environment will be previously unseen and many IoT devices have constrained computing resources. The recent surveys of intrusion detection systems in wireless sensor networks and IoT applications do not mention some novel attacks such as depletion of battery, denial of information etc. There is a lack of methods for comprehensive analysis of novel attacks. Thus, in the presented paper we consider a model of wireless network node behavior under energy exhaustion attacks.