Next Article in Journal
Elastic MCF Rubber with Photovoltaics and Sensing on Hybrid Skin (H-Skin) for Artificial Skin by Utilizing Natural Rubber: 2nd Report on the Effect of Tension and Compression on the Hybrid Photo- and Piezo-Electricity Properties in Wet-Type Solar Cell Rubber
Next Article in Special Issue
An Ontology-Based Cybersecurity Framework for the Internet of Things
Previous Article in Journal
Detecting and Monitoring the Flavor of Tomato (Solanum lycopersicum) under the Impact of Postharvest Handlings by Physicochemical Parameters and Electronic Nose
Previous Article in Special Issue
Influence of Different Coupling Modes on the Robustness of Smart Grid under Targeted Attack
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Depletion-of-Battery Attack: Specificity, Modelling and Analysis

1
Automobile/Ship Electronics Convergence Center, University of Ulsan, Ulsan 680-749, Korea
2
The School of Electrical Engineering, University of Ulsan, Ulsan 680-749, Korea
*
Author to whom correspondence should be addressed.
Sensors 2018, 18(6), 1849; https://doi.org/10.3390/s18061849
Submission received: 14 May 2018 / Revised: 4 June 2018 / Accepted: 4 June 2018 / Published: 6 June 2018
(This article belongs to the Special Issue Security in IoT Enabled Sensors)

Abstract

:
The emerging Internet of Things (IoT) has great potential; however, the societal costs of the IoT can outweigh its benefits. To unlock IoT potential, there needs to be improvement in the security of IoT applications. There are several standardization initiatives for sensor networks, which eventually converge with the Internet of Things. As sensor-based applications are deployed, security emerges as an essential requirement. One of the critical issues of wireless sensor technology is limited sensor resources, including sensor batteries. This creates a vulnerability to battery-exhausting attacks. Rapid exhaustion of sensor battery power is not only explained by intrusions, but can also be due to random failure of embedded sensor protocols. Thus, most wireless sensor applications, without tools to defend against rash battery exhausting, would be unable to function during prescribed times. In this paper, we consider a special type of threat, in which the harm is malicious depletion of sensor battery power. In contrast to the traditional denial-of-service attack, quality of service under the considered attack is not necessarily degraded. Moreover, the quality of service can increase up to the moment of the sensor set crashes. We argue that this is a distinguishing type of attack. Hence, the application of a traditional defense mechanism against this threat is not always possible. Therefore, effective methods should be developed to counter the threat. We first discuss the feasibility of rash depletion of battery power. Next, we propose a model for evaluation of energy consumption when under attack. Finally, a technique to counter the attack is discussed.

1. Introduction

The technology of wireless sensor systems has evolved over the last decade from where these systems were designed in a technology-dependent manner to a stage where some broad conceptual understanding of issues now exists. Significant progress in the area of micro-electro-mechanical technologies has enabled the development of inexpensive sensor nodes that communicate wirelessly. Wireless sensor networks (WSNs) can be used in a wide range of applications, such as air pollution monitoring [1], landslide detection [2], military applications and tracking [3], healthcare [4,5,6,7], and smart homes [8,9]. There are several projects on, and standardization initiatives for, sensor networks, which may eventually converge with the Internet of Things (IoT). For example, European Union projects of Internet of Things Architecture (IoT-A) have been addressing the challenges of IoT solutions development from a WSNs perspective [10].
As sensors-based applications are deployed, security emerges as an essential requirement. Future IoT threats will disable home security systems, flood fields, and disrupt hospitals. However, wireless sensor network survivability and reliability are low. The reasons are as follows: Sensor resources are limited. Usually, mobile terminal facilities do not allow application of an efficient defense scheme against intrusions. Wireless sensor technologies are relatively new and so, the corresponding defense tools are poor. Wireless sensors use unreliable channels. In wireless communications, the signal transmission is disturbed by noise. A sensor has to contact other sensors, which facilitates the spread of infection. Thus, it is very important to investigate potential attacks against wireless sensors and IoT systems. It is necessary to improve the security taxonomy, which can help to develop practical intrusion detection and attack mitigation systems. It is required to develop mathematical models for quantitative assessment of a safety level.
There are many sources for material on security issues in WSNs. Surveys of attacks against WSNs can be found [11,12,13,14]. In particular, the taxonomy of denial-of-service (DoS) attacks in WSNs was described [15]. According to these papers, attacks against sensors can be classified into attacks on the physical, medium access control (MAC), network, transportation, and application layers. A summary of typical DoS attacks on sensor networks and possible defense techniques is as follows. An approach based on spread-spectrum and a lower duty cycle is used against the jamming attack; tamper-proofing and special key management schemes are used against the tampering attack; an error correcting code is used against link layer attacks; rate limitation is used against any type of resource exhaustion; authentication, encryption, and probing are used against manipulation of routing information, selective forwarding attacks, and Sybil attacks. Both signature-based analysis and anomaly-based analysis are wide applied for DoS attacks detection in WSNs. In some cases, it is highly successful. However, traditional intrusion detection systems cannot deal with battery-depletion attacks [16]. A WSNs node is vulnerable to battery exhaustion for the following reasons. The cost of sensors has to be low; it is a market requirement. However, the cost of batteries tends to increase in proportion to their capacity. Hence, the capacity of a WSN node battery is low. In recent papers, power-exhausting attacks have been considered [17,18,19,20,21]. The authors considered these attacks as a special type of DoS attack, as well. However, the situation introduced in this paper has not been considered. Quality of service under a battery depletion attack is not necessarily degraded. Moreover, quality of service can increase, right up to the moment some critical set of sensors crashes. This gives rise to a novel type of attack that is not DoS.
Let us assume the following scenario. Malware in an infected sensor forces the sensor transmitter to essentially increase signal power. Sensor energy consumption is increased and leads to quick battery exhaustion. Radio communications is usually among the highest energy drains on WSN nodes. At the same time, the signal-to-noise ratio is improved. Hence, the quality of signal reception is improved. The sensor transmission range is increased. Hence, packet latency can be reduced. System throughput is increased right up to the crash, which happens when a group of sensors fails and the network becomes disconnected. The attack effect looks like physical destruction. According to the International Telecommunications Union definition, DoS attacks focus on preventing legitimate users of a service from using the service. In this case, the goal of the attack is not fast service degradation. Moreover, the quality of service can be temporarily improved. Therefore, it is not a DoS attack. The target of the attack is the equipment (more exactly, the sensor battery), and the goal of attack is to disable the battery. The attack tools can be similar to a DoS situation. It can be malware or relaxed jamming. Therefore, it is not a physical attack. Here, by the term “physical attack”, we mean that an attacker commits unauthorized physical actions to completely disable a sensor node (sensor node destroying, damaging of some key component of sensor equipment, thievery). Thus, we get a special type of attack. We name it the depletion-of-battery (DoB) attack.
This paper is organized as follows. In the next two sections, we discuss the related works and the feasibility of rash depletion of battery power. Next, we describe a model for sensor battery behavior when there is no attack. We then modify this model, taking into account the specifics of a DoB attack experienced due to packets flood. Next, we consider the DoB attack itself, which is caused by excessive power in the transmit signal. Thus, we propose theoretical tools for the evaluation of energy consumption under DoB attacks. A counteracting technique against the attack is discussed as well. Performance analysis and a brief conclusion finalize the paper.

2. Related Works

Most researchers of WSNs security note potential threats caused by the low capacity of sensor battery. Generally, authors consider some DoS attacks and mention that the fast exhaustion of sensor energy is one of the possible effects of attacks, along with others. An example of this situation is the wormhole attack. This not only wastes communication bandwidth but also makes network nodes consume the additional energy [22]. The other example is the clone attack (nodes replication attack). Generally, here the intruder goal is to overhear the traffic, inject false data into the system, and revoke legitimate nodes. However, the energy depletion of nodes can be a concomitant effect [23].
The Vampire attack [20] is one of the first attempts to define a new class of DoS attack related to the sensor battery power depletion. The authors consider two routing layer battery depletion attacks: the carousel attack and the stretch attack. In the carousel attack, a malicious node composes packets with purposely introduced routing loops. It is assumed that a sender of a packet defines the path the packet takes through the network. The attack exploits the limited verification of message headers at forwarding nodes, allowing a single packet to repeatedly traverse the same set of nodes. The stretch attack targets source routing protocols as well. It constructs artificially long packet paths, which potentially include every node in the network. The authors evaluate the vulnerabilities of existing protocols to Vampire attacks and provide an approach to reduce the attack damage by verifying that packets consistently make progress toward their destinations. Some slight modifications of this defense method for the same two attacks can be found in the papers [21,24,25]. The authors of Vampire attack mentioned that the attack differs from traditional DoS. In this case, a defense strategy against traditional DoS does not protect against intelligent adversaries who use a small number of packets or do not originate packets at all. However, it is still a DoS attack. Obviously, the Vampire attack increases packet latency, and further the packets loss rate can be potentially increased. Thus, the quality of service degrades. Hence, traditional intrusion detection systems based on QoS degradation monitoring can be applied for the Vampire attack detection.
In the paper [26], authors considered a novel type of attacks on the energy system of a ubiquitous sensor network. The attack is based on the spurious flows generation. The authors experimentally demonstrated that the system lifetime can be reduced seven times and the intrusion effect depends more on the spurious flow intensity than on the average speed of mobile nodes.
The denial-of-sleep attack tries to keep the sensor nodes awake to consume more energy. In previous papers, it is being seen as a special type of DoS attack [17,19,27,28,29]. An intruder can broadcast a fake preamble in the sender-initiated MAC protocols. The adjacent nodes wake up, hear the fake preamble, and stay away to receive and process spoofed data from the intruder (B-MAC). The attack keeps the receivers awake as long as it exhausts the battery of sensors. An intruder can cheat the attacked sender to establish a communication session. The sender will start to send the data to the intruder but the intruder will never replay by the ACK packet (X-MAC). Therefore, the victim node does not complete data transmitting and exhausts the battery rapidly. In these scenarios, the packet delivery ratio degrades. It is also possible to organize the denial-of-sleep attack, which temporarily improves the packet latency and the packets delivery ratio. For example, an intruder can intercept and faster retransmit a flow of legal packets. However, this facility has not been properly investigated.
The battery exhaustion effect can be strengthened by data encryption. The intruder can send the encrypted spoofed data to attacked node. Before the victim identifies that the data is spoofed, the victim consumes more energy to receive and decrypt data. The threats for traditional wireless sensor networks may also occur in networks with more powerful sensor motes. Even in wireless multimedia sensor networks, an intruder may rapidly drain the energy of nodes [30]. It has been shown that mobile devices supporting IEEE 802.11 and IEEE 802.15.1 standards are vulnerable to battery exhaustion attacks [31]. Authors remark that this is DoS attack. It violates the overall operation of the device. Generally, sensors are deployed in unattended and hostile environments. Therefore, an intruder can easily receive a physical access to a sensor and extract all the stored keys [32]. The recent encryption schemes use a source-destination path key to protect data transmitted over the route instead of using multiple pairwise shared keys to repeatedly perform encryption and decryption over every link [33]. Thus, a big part of the computational and energy expenses is delegated to the sink. It improves the energy efficiency of intermediate sensors. However, it makes a system vulnerable to flooding attack.
In the paper [34] a malware based battery depletion attack is considered. The authors focus on the strategy of malware behavior and optimize the rate of network nodes infection. The infective state is modeled by one state of the four-state Markov chain. Moreover, the energy depletion time is assumed to be exponentially distributed at time. Therefore, it is assumed that the residual battery charge does not depend on time. It is not applicable for limited capacity of sensor battery. Similar simplified assumptions have been used in our previous paper [18], when the energy exhausting DoS attack has been considered. These simple models are convenient for a general consideration of defense strategies. However, it cannot be applied for comprehensive analysis of concrete attacks. In the present paper, we provide more detailed and complicated models.
Our previous papers [35,36] presented for the first time the idea that DoB is a novel type of attack that is not necessary DoS. In the present paper, we provide the next generation of research in this direction. We essentially improve the background information and totally revise the system model and survivability metrics.

3. DoB Feasibility and Features

DoB can be caused by deliberate action or a random combination of circumstances. A random failure of embedded sensor protocols can lead to the scenario of DoB without malware. If a routing algorithm is not energy efficient, remote sensors can be connected by direct links without intermediate nodes. It leads to latency reduction. However, WSN lifetime becomes very short.
The considered attack can be organized by relaxed jamming. If a sensor cannot adaptively change transmission power, then the intrusion is equivalent to the well-known DoS attack on WSNs called jamming. Jamming can disrupt wireless connections and can occur either unintentionally (in the form of interference) or through collisions. A jamming attack is usually effective, since expensive hardware is not required in order to launch one. It can be implemented by medium listening and broadcasting on the same frequency band as the sensors, so it can lead to significant effects with small incurred costs for the attacker. If a sensor can counteract noise by increasing transmission power, then the object of the attack becomes the battery of the sensor, wherein the signal quality and transmission range can be increased. The same effect can be caused by malware [16]. Malware can force a sensor to increase transmission power. In addition, malware can block sensors close to sink, so some other node has to increase its communication power without being able to use intermediate link to sink.
It is generally assumed that the sensor duty cycle contains a sleep mode. The need to wait for an active slot increases the latency in cases where asynchronous WSN sensors use preamble-based MAC protocols for connection setup and data transmission. It takes a random amount of time, and increases packet delay. The sleep mode can be blocked by malware. If the sleep mode is blocked, packet delay will be reduced. Moreover, increasing node throughput leads to a packet loss rate reduction. Hence, the QoS is improved. However, sensors quickly exhaust their batteries. The details of denial-of-sleep attacks and their impacts on MAC protocols (S-MAC, T-MAC, B-MAC, and G-MAC) are described in [17]. The authors mentioned that an attacked network can maintain throughput and latency similar to that of the network when it is not under attack.
Alternative methods for DoB organization can be offered as well. For example, an intruder can organize an infinite session with an attacked node. Vulnerabilities of MAC protocols can be used for frequent wake-up. Implementation of DoB attacks based on excessive transmissions, accompanied with increasing packets latency, is described in [20]. Thus, there are two types of DoB. Attacks of one type lead to QoS degradation and can be considered as the DoS attack, whereas others may improve QoS.
Figure 1 shows how DoS and DoB attacks interrelate. The yellow circle represents DoS attacks. Typical examples include Selective Forwarding. Some research [11,37] on the sensor network threats showed that the total number of transmissions is reduced under this attack. Hence, the total energy consumption is generally reduced. In total, Selective Forwarding can improve QoS parameters such as delay and loss rate. However, quality of information degrades; therefore, it is a DoS attack. The blue circle represents DoB attacks. The denial-of-sleep attack can represent the DoB class, when taking into consideration the arguments mentioned above. Another representative of this type of intrusion is DoB caused by excessive power in the transmit signal. The intersection of DoS and DoB is not empty. There is a set of attacks that are common to both DoS and DoB. For example, attacks based on packets flooding (see, for example [38]) lead to buffer overflow in sensors, the low packet delivery ratio, the increased packet latency as well as rash battery exhausting. In the next section, we consider in detail the DoB attack caused by excessive packets transmissions, accompanied with QoS degradation, and the DoB attack caused by excessive transmission power, with possible QoS improvement. The provided results can be adapted for other DoB attacks.

4. DoB Analysis

In this section, we present a theoretical framework for modeling and analyzing DoB attacks. The proposed models are based on continuous time Markov chains (CTMC). This technique is generally used when the various performance metrics of WSNs are calculated. For example, these metrics include the effectiveness of battery recovery [39], characteristics of Rayleigh fading channels [40], the average number of successful transmissions completed by WSN nodes [41], and the effectiveness of protection against timing attacks [42]. Here, we consider the impact of a DoB attack, as well as the sensor battery capacity, on the system lifetime. Approaches to WSN lifetime estimation are discussed, as well.

4.1. System Model

Let us consider a node in a WSN that transmits its own generated data and retransmits data of other sensors. We first discuss the sensor behavior under normal conditions, i.e., any attacks are absent. Next, the proposed model will be easily modified for intrusion cases. The transmitted packet stream is assumed to be Poisson with an average transmission rate of λ packets per time unit. Let e 0 be the energy needed to handle one packet. Assume the energy consumption for packet transmitting is much higher than the energy consumption for other activities (packet receiving, idle listening, monitoring, data collection). Thus, without loss of generality, e 0 is the energy consumption for transmitting one packet. If the current capacity of sensor battery is less than e 0 then the packet transmission has failed. Thus, it makes no sense to consider the energy consumption per bit in this work.
Let C be the charge capacity of a sensor battery. The total number of packets transmitted by a sensor, N 0 , can be estimated as follows:
N 0 = C / e 0 .
After further consideration, N 0 is rounded to the nearest integer.
Let the discrete random variable N ( t ) be the sensor lifetime at time t in terms of a number of transmissions. In other words, the residual battery charge at time t is enough for transmission of N ( t ) packets, but not enough for transmission of N ( t ) + 1 packets. For our purposes, it is convenient to model the sensor behavior by the following Markov process:
{ N ( t ) ,   t 0 } ,
where N ( 0 ) = N 0 . The process takes non-negative integer values. If N ( t ) = 0 , then the sensor battery is completely depleted, and the sensor is faulty. Here, λ is the rate at which packet transmission occurs. Let us denote the state probabilities as follows:
P k ( t ) = P [ N ( t ) = k ] , k = 0 ,   1 ,   ,   N 0 .
It is clear that for a given t
k P k ( t ) = 1 .
This process is known as the pure death process. The state probabilities are described by the following differential equations (for example, see [43])
d P k ( t ) d t = λ   P k ( t ) + λ   P k + 1 ( t ) , 0 < k < N 0 , d P N 0 ( t ) d t = λ   P N 0 ( t ) , d P 0 ( t ) d t = λ   P 0 ( t ) ,
with known solution
P k ( t ) = ( λ t ) N 0 k ( N 0 k ) !   e λ t , 0 < k N 0 .
Therefore,
P 0 ( t ) = 1 e λ t k = 1 N 0 ( λ t ) N 0 k ( N 0 k ) ! = 1 e λ t k = 0 N 0 1 ( λ t ) k k ! .
The function P 0 ( t ) is the probability of the sensor being faulty at time t. This function is useful for sensor survivability estimation. Let T be the sensor lifetime. It is a random variable with the cumulative distribution function (CDF) F T ( t ) . By CDF definition, F T ( t ) equals the probability of the event T t . Hence,
F T ( t ) = ( T t ) = 1 ( T > t ) = P 0 ( t ) .
Thus, T is an N 0 -stage Erlang random variable. Hence, the expected sensor lifetime (also known as mean time to failure or MTTF) can be estimated as follows:
MTTF = N 0 λ .
It is a commonly used survivability metric [42,44]. MTTF provides the mean time it takes for the sensor to reach the failure state for a given initial state of the sensor. This result can also be derived from the fact that process N ( t ) spends an exponentially distributed time in each of its states.
In WSNs investigations, researchers often consider the lifetime of the whole system. At that point, the WSN lifetime is generally defined as the time duration until the first sensor node is out of battery power [45,46,47,48,49,50,51,52]. The corresponding authors remark that the loss of a sensor quickly adds extra loads to its neighboring sensors. It leads to a rapid collapse of the network. Moreover, in some cases the network gets partitioned when the first node dies. It is reasonable to assume that critical sensor nodes are attacked first. In view of the above, we consider the following situation. Let a network contains m critical sensors. The failure of any critical sensor leads to the failure of whole system. Assume the sensor lifetimes, denoted by T 1 , T 2 , , T m , are mutually independent random variables. Therefore, the system lifetime τ is also a random variable and
τ = min   { T 1 , T 2 , , T m } .
We get:
( τ > t ) = ( T j > t j 1 , m ¯ ) = j = 1 m ( 1 F T j ( t ) ) .
Therefore, the CDF of τ is defined as follows:
F τ ( t ) = 1 ( τ > t ) .
If all m sensors are in the same condition, such that T j   ( 1 j m ) are identically distributed variables with CDF F T ( t ) , then:
F τ ( t ) = 1 ( 1 F T ( t ) ) m = 1 e λ m   t ( k = 0 N 0 1 ( λ   t ) k k ! ) m .
In applications, it is often required to support the desired system lifetime. Let us consider the probability of the event “the system lifetime exceeds the given threshold.” For a given threshold h we get:
( τ > h ) = 1 F τ ( h ) .
Thus, the desired probability is defined as follows:
( τ > h ) = e λ m   t ( k = 0 N 0 1 ( λ   t ) k k ! ) m .
This result can be generalized. Now, for a given m , let us introduce the system survivability function (SSF) of some nonnegative real variables h , λ , and a nonnegative integer variable y :
( h , λ , y ) : 0 × 0 × [ 0 , 1 ]
as follows:
( h , λ , y ) = e λ   m   h ( k = 0 y 1 ( λ   h ) k k ! ) m .
This function gives the probability that a network has not failed within time h. Note that ( h , λ , y ) is the monotonically decreasing function of h,
( 0 , λ , y ) = 1 , lim h ( h , λ , y ) = 0 .
We offer to use the function ( h , λ , y ) as an alternative survivability metric of WSNs. If DoB is absent, then the value of y is given by formula (1), and we get ( h , λ , N 0 ) . Under a DoB attack, both y and λ can be changed. Below, MTTF and SSF are used for DoB threat estimation.

4.2. DoB Based on Excessive Packets

We now consider the case where a DoB attack is organized by excessive packet generation. An intruder can generate spoofed packets, retransmit legal packets multiple times, use an inefficient routing path, or use other ways to increase the offered load on the sensors. In this case, the traffic intensity essentially grows, and obviously, QoS is degraded. The novel traffic rate is:
λ * = ( λ A + λ ) p A + λ ( 1 p A ) = λ A p A + λ .
Here, λ A is the redundant packet rate, and p A is the probability of the presence of an attack. The state diagram for sensor battery behavior is shown in Figure 2. If p A = 0 , then an attack is absent, and we get the situation described above. If p A = 1 , then the sensor is permanently under attack.
Generally 0 < p A < 1 for the following reasons. The intrusion duration can be non-continuous and random. It can be designed by an attacker, in that this attack is energy efficient and hardly detectable. Examples include selective forwarding, random or reactive jamming. In the DoB attack, the set of target sensors and the duration of spoofed packets injection can be randomly defined and dynamically changed, as well. Moreover, the DoB attack can be suspended for reasons beyond the attacker’s control. For example, a sensor can switch itself to sleep mode. The spoofed packets can be recognized and eliminated from the outgoing flow. A sensor does not receive packets if there is buffer overflow, and so on.
Being that the energy consumption for transmitting one packet is not changed, the total number of packets transmitted by a sensor is given by formula (1). The expected sensor lifetime becomes:
MTTF = N 0 λ * ,
and
SSF = ( h , λ * , N 0 ) .
The result of DoB is λ * / λ times degradation in MTTF, and:
λ * λ = 1 + λ A λ p A .
To estimate the value of p A , an additional model is required. Model details vary, depending on the objectives and scope of the researchers. Here, we consider the particular case as follows. Assume a sensor has the following states:
  • Norm—an attack is temporally absent and the sensor functions correctly
  • Attack—besides legal packets, a sensor receives and transmits spoofed packets
  • Safety—a sensor does not transmit any packets
A sensor enters the Safety state not only under the influence of attack, but also under normal conditions. Generally, firmware of sensors supports sleep mode. It is a widely used approach for energy consumption optimization. Therefore, a sensor can switch to safety mode even if an attack is absent.
In this scenario:
  • an attacker attempts to deplete the sensor battery as soon as possible, so the DoB attack can be interrupted if and only if the sensor is switched to the safety mode; and
  • safety mode control does not depend on the previous sensor state
It has been suggested to model sensor functioning by the irreducible aperiodic continuous-time Markov chain, with the states space Ω = {Norm, Attack, Safety}, as shown in Figure 3. The presented model is a modification of models from elsewhere [18,53,54].
The infinitesimal generator G of the corresponding Markov process is as follows:
G = ( ( α 1 + β 1 ) α 1 β 1 0 α 2 α 2 β 2 0 β 2 ) ,
where α 1 is the transition rate to the attack state, and α 2 is the transition rate from the attack state. These parameters describe the attack intensity and the sensor’s ability to counteract the intrusion. The variable β 1 denotes the transition rate from the normal state to the inactive safety state, while β 2 denotes the transition rate from the safety state to the normal state, when the sensor transmits packets.
Let p N , p A , p S denote the corresponding equilibrium probabilities, i.e., the vector p = ( p N , p A , p S ) satisfies the balance equations:
p G = 0 ,
and
j Ω p j = 1 .
From here, the equilibrium probabilities can easily be derived in closed form. We get:
p A = ρ ( G ) , p N = α 2 α 1 ρ ( G ) , p s = α 2 α 1   α 1 + β 1 β 2 ρ ( G ) ,
where
ρ ( G ) = ( 1 + α 2 α 1 + α 2 β 2 + α 2 β 1 α 1 β 2 ) 1 .
Therefore, in the considered scenario, we get:
MTTF = N 0 λ A ρ ( G ) + λ ,
and
SSF = ( h , λ A ρ ( G ) + λ , N 0 ) .
From the obtained results, it can be concluded that for the same duty cycle rate, it is advisable to increase the sleep mode duration in order to reduce the influence of DoB.

4.3. DoB based on Excessive Transmission Power

In this case, an intruder does not use additional packets. However, the radio transceivers of critical sensors are forced to increase transmission power. Assume that in the normal state, a sensor passes packets to a sink through a set of intermediate sensors, I S . Under a DoB attack, this sensor transmits packets directly to the sink at a longer distance. In this case, packet transmission rate λ is not changed. However, the energy consumption for transmitting one packet is increased. Let e A be the energy amount consumed for one packet transmissioin under a DoB attack, e A e 0 . Now, the total number of packets transmitted by a sensor, n A , can be estimated as follows:
n A = C / e A .
The sensor battery behavior shown in Figure 2 is the same, except for the number of states, which is drastically reduced: n A N 0 . Therefore, in this scenario:
MTTF = n A λ ,
and
SSF = ( h , λ , n A ) .
It is easy to see that the MTTF of the attacked sensor degrades N 0 / n A times. At the same time the system QoS can be improved. To illustrate this, we consider part of a wireless sensor network, shown in Figure 4.
The sensor s A monitors an event of interest, generates a report, and transmits the report to the sink node through sensors set I S . Here, set I S is a chain of n C sensors.
The delivery latency in packets generated by sensor s A is random variable t L and:
t L = j = 1 n c t j + t 0 ,
where t j is the packet service time at node j . It includes time expenses for packet receving, data treatment, waiting, and packet transmitting. The variable t 0 is the interaction time between the sink and adjacent nodes. The variables t j , where j I S , are assumed to be identically distributed. Therefore, the average delivery latency is:
E t L = n c t ¯ + E t 0 ,
where t ¯ is the average service time at a node.
When under DoB attack, sensor s A sends data directly to the sink. Therefore, the average delivery latency becomes E t 0 .
Generally, t ¯ E t 0 . However, even if t ¯ E t 0 , the packet delivery latency, which is an important QoS parameter, is reduced significantly: n c + 1 times.
If I S also receives packets from sensors other than s A , and packets losses are possible, then DoB decreases the offered load for I S . Therefore, the loss rate is decreased as well. Thus, the system QoS can be improved under DoB. At the same time, system lifetime is essentially degraded.
The harm from DoB attacks based on excessive transmission power can be stronger, compared to DoB attacks caused by excessive packets, even if not interrupted ( p A = 1 ). To confirm this proposition, consider MTTF:
n A λ < N 0 λ A + λ .
Taking into account equality (1), we get:
e A > e 0 ( 1 + λ A λ ) .
If the above inequality is satisfied, then DoB accompanied by QoS improvement is more destructive than powerful DoB attacks accompanied by QoS degradation.

5. DoB Detection

In this section, we discuss some aspects of DoB detection. Implementation details of intrusion detection system (as well as specific intrusion prevention and mitigation technique, countermeasures against compromised nodes) are out of scope of this paper.
A defense scheme against intrusions in WSNs can include identification of attack source, localization of victim sensors, activating safe operating mode, and malicious node isolation. But before applying reactive protection, the DoB attack has to be detected. If reactive protection is used in the normal stage, then sensor throughput degrades. Therefore, reactive protection has to be activated in the attack stage and deactivated in the normal stage. Hence, it is important to detect intrusions with high confidence, that is to say, provide a satisfactory level of false positives and false negatives. In the case of a DoS (or DDoS) attack, the principle of collaborative and distributed detection can essentially improve the efficiency of intrusion detection systems [55]. If nodes detect an attack with inconclusive evidence, then a cooperative intrusion detection procedure aggregates the node reports, and provides a decision about the presence of an intrusion. Due to the increment of QoS degradation under DoS, it allows one to recognize attacks in the early stages. The complexity of the DoB detection problem is that the principle of collaborative and distributed detection does not work well in this case. To illustrate, consider the situation in Figure 4.
In the normal state, the energy consumption of sensor s A and the sensors of I S is as follows:
E N = j = 1 n c e ( j ) + e ( s A ) .
Here and below, e ( x ) is the energy consumption of sensor x. Without loss of generality, assume that adjacent nodes are separated by distance d. Taking into account our model assumptions, we get:
j I S   e ( j ) = e ( s A ) = a · d γ ,
where γ is called the path loss exponent, and a is a constant defined by the transmitter power amplifier [56]. Therefore:
E N = ( n c + 1 ) · a · d γ ,
Under a DoB attack, the total energy consumption becomes:
E A = a · d S γ ,
where d S is the distance between sensor s A and the sink node. It is possible to reduce the total energy consumption under DoB. In fact, we get the following inequality:
E A < E N ,
and hence
d S < d · n c + 1 γ .
For example, if γ = 2 ,   n c = 8 ,   d S =   3 d , then the total energy consumption is not changed. At the same time, the system lifetime degrades by nine times. If a decision about a DoB presence is based on observation of all sensors, then the attack is not detected.
Thus, it is reasonable to deploy an intrusion detection system at each node. It consumes some system resources, and leads to some QoS degradation, but it is a reasonable price for supporting system security.
For DoB attack detection, the point-of-change detection technique can be applied [57]. The idea of the intrusion detection method is based on the assumption that DoB attacks lead to relatively abrupt changes in the process of sensor battery depletion compared to energy consumption in the normal case. The detection algorithm is a kind of cumulative sums method (also known as CUSUM). The incoming random values for the algorithm are observations of sensor energy consumption per time units. Let ξ j ,   j > 1 be the sensor energy consumption per a time unit (a few seconds). The time units are not necessary equal. It is reasonable to merge the successive units, when the energy consumption is very low. If an attack is launched, then the observed random sequence, { ξ j } changes own properties. Let T a t t a c k be the attack start time (change-point). Let us use the designation T a l a r m for the moment of time when the decision about attack presence is made and the corresponding alarm signal is generated. Generally, it needs to minimize the difference T a l a r m T a t t a c k expecting that T a l a r m > T a t t a c k . If T a l a r m < T a t t a c k then the false alarm takes place. Due to the stochastic character of observed energy consumption, the false alarm can be generated many times. The reaction for false alarms can essentially reduce the network performance. It needs to reduce the false alarm rate as much as possible. A conventional change-point detection approach is based on the cumulative sum:
S 0 = 0 , S i = max ( 0 , S i 1 + Δ i ) .
Here, Δ i is a function of observations ξ i . For example, in some approaches, which have been offered for DDoS attacks detecting, the log-likelihood ratio is taken as the function Δ i . It can be applied for DoB detection as well. The alarm time moment is defined as follows:
T a l a r m = inf   { i 1 : S i > h } ,
where h is some threshold value. This scheme has the disadvantage that the proper threshold h is hard to evaluate. Generally, it is recommended to define h by simulation to get the tradeoff between efficient detection and false alarm rate.
If the battery capacity is large enough, then the fast discharge of sensor battery within a reasonable time is not a significant detriment. Therefore, if the attack is detected during this time, it is possible to avoid a considerable harm. In this case, the efficient method of point-of-change detection with given lag can be applied [58]. Let the admissible lag equals T l a g time units. If the alarm signal is declared at any time after T a l a r m and before T a t t a c k + T l a g , then the attack is considered to be successfully detected. If T a l a r m > T a t t a c k + T l a g , then the intrusion is successful. Under the condition of fixed false alarm rate, the attack detection probability has to be maximized, while under the fixed probability of attack detection, the probability of false alarm has to be minimized. The provided formulation of the change-point detection problem addresses the case where the cumulative distribution function for ξ j convolution can be derived. In this case, the optimal threshold value can be calculated.
Let α ˜ be the required false alarm rate, w be the number of observations within T l a g , F ξ , w is CDF of the convolution ξ 1 ξ 2 ξ w :
F ξ , w ( x ) = ( j = 1 w ξ j x ) ,   x .
Therefore, the optimal threshold is as follows:
h o p t = F ξ , w 1 ( 1 α ˜ ) ,
where F ξ , w 1 is the inverse function of F ξ , w .
If the alarm time moment is defined as follows:
T a l a r m = inf   { i w + 1 :   j = i w i ξ j > h o p t } ,
then the provided threshold maximizes the probability of attack detection. The choice of a particular discord detection procedure depends largely on practical applications and WSNs environment.

6. Performance Analysis

In this section, we provide simulation experiments to illustrate the theoretical results, by which we discuss the impacts of the DoB attack parameters on the network survivability metrics as well. The provided results are expected to offer insights into the enhancement of protection mechanisms.
We first consider the sensor lifetime under DoB caused by both excessive packets and excessive transmission power. We set sensor battery capacity C = 1000   e 0 , and the packet transmission rate in the normal case to λ = 1 .
Besides the deterministic energy consumption of packet transmission, we consider the cases, when it is a random number. In some previous works the battery charge of a sensor had been described by the normal distribution (see, for example, [59]). Since the energy consumption of packet transmission cannot be negative and is limited from above, we use a truncated normal distribution. Let us introduce the following designation for doubly truncated normal distribution function [60]:
Φ T ( x | ν , σ 2 , A , B ) = 1 π   σ e ( x ν ) 2 / 2 σ 2 [ 1 π   σ A B e ( t ν ) 2 / 2 σ 2 d t ] 1 ,
where A and B are the lower and upper truncation points, respectively.
The following DoB attack scenarios have been considered.
  • Case 1. The attack is caused by excessive packets, so, redundant packets rate λ A = 7 and it is assumed that p A = 1 . The energy consumption for transmitting each packet is not changed, and equals e 0 .
  • Case 2. The scenario is the same as in Case 1, except that the energy consumption of packet transmission is not deterministic. It is assumed to be a random variable having the cumulative distribution function Φ T ( x | e 0 , 1 , 0 , 2 e 0 ) .
  • Case 3. A victim sensor is forced to increase the transmission range by three times, and in formula (6) γ = 2 ,   a = 1 . The packet transmission rate is not changed: λ = 1. So, the attack is caused by excessive transmission power.
  • Case 4. This is the same as Case 3, except that the energy consumption of packet transmission is randomly distributed with the cumulative distribution function Φ T ( x | e A , 1 , 0 , 2 e A ) .
In all four cases, a sample of size 1000 was used to analyze the sensor lifetime degradation.
The simulation results correspond to those of analytical expression: Formulas (2) and (3). The cases of deterministic energy consumption of packet transmission are consistent with the cases when this energy consumption has a truncated normal distribution. It is shown in Figure 5.
The bottom and top of the gray boxes are the first and third quartiles. The black line inside each box shows the median. The whiskers stretch from the edge of the boxes to the furthest sample data point that is within 1.5 times the interquartile range. If some points are past the ends of the whiskers, they are displayed with dots. They can be considered to be outliers.
The sample variability in Case 3 is higher than in Case 1. This is not surprising, since the variance of Erlang random variable is directly proportional to the shape parameter, and is inversely proportional to the square of the rate parameter. The theoretically predicted MTTF in Case 1 is 225, and in Case 3 it is 200. It is consistent with the sample-based estimation of MTTF. The detailed statistics is shown in Table 1.
We next consider the system survivability function. The behavior of ( h , 1100 ) is shown in Figure 6.
The system survivability is relatively high up to 80% of MTTF, and then it drastically degrades. There is an inverse relationship between the cardinality of the critical sensors set and system survivability; when m decreases, SSF increases.
Let us consider two DoB scenarios: an attack caused by spoofed packets, and an attack caused by excessive transmission power. In the first, case the traffic rate is increased ten times, i.e., λ * = 10 . In the second case, the energy consumption of packet transmission is increased ten times, as well, e A = 10 e 0 . All other system parameters are the same. It can be seen that MTTF is the same in both cases.
The most adversely DoB scenario for the victim sensor depends on time. This is verified through simulation results demonstrated in Figure 7, i.e., the harm from DoB caused by spoofed packets exceeds the harm from DoB caused by transmitting power increasing up to the MTTF point, and after this, we get the inverse situation. Obviously, SSF gets closer and closer to zero as time increases.
We also examine the tradeoff between DoB detection success and false alarm. The system model assumptions are the same as those discussed in Section 3. Under a DoB attack, the energy consumption per time unit is three times higher than the initial value. The false alarm rate takes the values 0.01, 0.05, 0.1, 0.2.
In Figure 8, the optimal threshold is shown as a function of the false alarm (left plot) and the DoB detection probability (right plot). For example, if the required false alarm rate is 0.05 and T l a g = 5 , then the optimal threshold value equals 11. If h is larger than the mentioned value, then the required false alarm rate cannot be supported. If h < 11, then the false alarm probability is less than 0.05; however, the intrusion detection probability is not minimized. The best detection result under given conditions is achieved with h = 11, it is 0.82.
Generally, if the selected threshold exceeds the optimal threshold then the false alarm rate is reduced; however, it reduces the intrusion detection probability as well. From Figure 8, observe that the optimal threshold is an increasing function of T l a g . This is due to the fact that the change point detection rule is based on sum of non-negative numbers.
Let us remark that the quality of detection algorithms can be essentially improved by increasing admissible lag. If in the example above, the required false alarm rate α ˜ = 0.01 and T l a g = 15 , then the attack is detected with confidence 99.9%. However, it makes sense if the sensor battery capacity is large enough.

7. Conclusions

In this paper, we consider a special security threat in sensor networks. The attack is named depletion-of-battery. DoB is considered as a distinguishing type of attack. Their goal is rather a physical harm, while QoS can be temporarily improved. Energy exhausting attacks, which had been considered previously, are accompanied by QoS degradation (e.g., vampire attacks). DoB can be caused by deliberate action or a random combination of circumstances. To estimate the effect of the DoB attack, corresponding mathematical models based on stochastic processes have been developed. The protection approach can be based on independent power control for sensors and also on effective monitoring based on the methods of discord detection. The proposed theoretical framework is supported by simulation results. In our future work, we will develop a comprehensive intrusions taxonomy, which includes the considered DoB attack and their variations. We plan to extend the system survivability analysis into DoB mitigation schemes. For these purposes, we will develop the corresponding system models based on continuous-time continuous-state processes. In addition, as a future research challenge, we envision that the development of intrusion detection systems for various scenarios of WSNs/IoT applications will be a promising research direction.

Author Contributions

V.S. conceived the idea, performed the theoretical analysis and calculations. I.K. critically reviewed and revised the paper.

Acknowledgments

This research was supported by Basic Science Research Program through the National Research Foundation of Korea(NRF) funded by the Ministry of Education(NRF-2017R1D1A3B03030386).

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Ma, Y.; Richards, M.; Ghanem, M.; Guo, Y.; Hassard, J. Air Pollution Monitoring and Mining Based on Sensor Grid in London. Sensors 2008, 8, 3601–3623. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  2. Yu, Z.; Xu, S.; Zhang, S.; Yang, X. Distributed detection in landslide prediction based on Wireless Sensor Networks. In Proceedings of the World Automation Congress, Puerto Vallarta, Mexico, 24–28 June 2012; pp. 235–238. [Google Scholar]
  3. Akyildiz, I.F.; Su, W.; Sankarasubramaniam, Y.; Cayirci, E. Wireless Sensor Networks: A Survey. Comput. Netw. 2002, 38, 393–422. [Google Scholar] [CrossRef]
  4. Gope, P.; Hwang, T. BSN-Care: A Secure IoT-Based Modern Healthcare System Using Body Sensor Network. IEEE Sens. J. 2016, 16, 1368–1376. [Google Scholar] [CrossRef]
  5. Milenkovic, A.; Otto, C.; Jovanov, E. Wireless sensor network for personal health monitoring: Issues and an implementation. Comput. Commun. 2006, 29, 2521–2533. [Google Scholar] [CrossRef]
  6. Junnila, S.; Kailanto, H.; Merilahti, J.; Vainio, A.-M.; Vehkaoja, A.; Zakrzewski, M.; Hyttinen, J. Wireless, Multipurpose In-Home Health Monitoring Platform: Two Case Trials. IEEE Trans. Inf. Technol. Biomed. 2010, 14, 447–455. [Google Scholar] [CrossRef] [PubMed]
  7. Bachmann, C.; Ashouei, M.; Pop, V.; Vidojkovic, M.; Groot, H.D.; Gyselinckx, B. Low-power wireless sensor nodes for ubiquitous long-term biomedical signal monitoring. IEEE Commun. Mag. 2012, 50, 20–27. [Google Scholar] [CrossRef]
  8. Han, K.; Shon, T.; Kim, K. Efficient mobile sensor authentication in smart home and WPAN. IEEE Trans. Consum. Electr. 2010, 56, 591–596. [Google Scholar] [CrossRef] [Green Version]
  9. Byun, J.; Jeon, B.; Noh, J.; Kim, Y.; Park, S. An intelligent self-adjusting sensor for smart home services based on ZigBee communications. IEEE Trans. Consum. Electr. 2012, 58, 591–596. [Google Scholar] [CrossRef]
  10. Uckelmann, D.; Harrison, M.; Michahelles, F. Architecting the Internet of Thing; Springer: Berlin/Heidelberg, Germany, 2011; pp. 10–11. [Google Scholar]
  11. Zhou, Y.; Fang, Y.; Zhang, Y. Securing wireless sensor networks: A survey. IEEE Commun. Surv. Tutor. 2008, 10, 6–28. [Google Scholar] [CrossRef]
  12. Young, M.; Boutaba, R. Overcoming Adversaries in Sensor Networks: A Survey of Theoretical Models and Algorithmic Approaches for Tolerating Malicious Interference. IEEE Commun. Surv. Tutor. 2011, 13, 617–641. [Google Scholar] [CrossRef] [Green Version]
  13. Chen, X.; Makki, K.; Yen, K.; Pissinou, N. Sensor network security: A survey. IEEE Commun. Surv. Tutor. 2009, 11, 52–73. [Google Scholar] [CrossRef]
  14. Mpitziopoulos, A.; Gavalas, D.; Konstantopoulos, C.; Pantziou, G. A survey on jamming attacks and countermeasures in WSNs. IEEE Commun. Surv. Tutor. 2009, 11, 42–56. [Google Scholar] [CrossRef]
  15. Raymond, D.; Midkiff, S. Denial-of-Service in Wireless Sensor Networks: Attacks and Defenses. IEEE Pervasive Comput. 2007, 7, 74–81. [Google Scholar] [CrossRef]
  16. Kim, H.; Shin, K.; Pillai, P. MODELZ: Monitoring, detection, and analysis of energy-greedy anomalies in mobile handsets. IEEE Trans. Mobile Comput. 2011, 10, 968–981. [Google Scholar]
  17. Raymond, D.; Marchany, R.; Brownfield, M.; Midkiff, S. Effects of denial of sleep attacks on wireless sensor network MAC protocols. IEEE Trans. Veh. Technol. 2009, 58, 367–380. [Google Scholar] [CrossRef]
  18. Shakhov, V.V. Protecting Wireless Sensor Networks from Energy Exhausting Attacks. Lect. Notes Comput. Sci. 2013, 7971, 184–193. [Google Scholar]
  19. Hsueh, C.; Wen, C.; Ouyang, Y. A Secure Scheme Against Power Exhausting Attacks in Hierarchical Wireless Sensor Networks. IEEE Sens. J. 2015, 15, 3590–3602. [Google Scholar] [CrossRef]
  20. Vasserman, E.; Hopper, N. Vampire attacks: Draining life from wireless ad-hoc networks. IEEE Trans. Mob. Comput. 2013, 12, 318–332. [Google Scholar] [CrossRef]
  21. Nisha, A.; Vaishali, V.; Shivaranjani, T.; Subathra, P. The effect of vampire attacks on distance vector routing protocols for wireless ad hoc sensor networks. In Proceedings of the IEEE International Conference on Science Technology Engineering and Management, Chennai, India, 30–31 March 2016; pp. 587–594. [Google Scholar]
  22. Gupta, C.; Pathak, P. Movement based or neighbor based technique for preventing wormhole attack in MANET. In Proceedings of the IEEE Symposium on Colossal Data Analysis and Networking, Indore, India, 18–19 March 2016; pp. 1–5. [Google Scholar]
  23. Zeng, Y.; Cao, J.; Zhang, S.; Guo, S.; Xie, L. Random-Walk Based Approach to Detect Clone Attacks in Wireless Sensor Networks. IEEE J. Sel. Areas Commun. 2010, 28, 677–691. [Google Scholar] [CrossRef]
  24. Himabindhu, S.; Sateesh, G. Depletion of Energy Attacks in Wireless Sensor Networks. J. Eng. Comp. Sci. 2014, 3, 7664–7667. [Google Scholar]
  25. Patel, A.; Soni, S. A Novel Proposal for Defending Against Vampire Attack in WSN. In Proceedings of the IEEE International Conference on Communication Systems and Network Technologies, Gwalior, India, 4–6 April 2015; pp. 624–627. [Google Scholar]
  26. Koucheryavy, A.; Bogdanov, I.; Paramonov, A. The mobile sensor network life-time under different spurious flows intrusion. Lect. Notes Comput. Sci. 2013, 8121, 312–317. [Google Scholar]
  27. Brownfield, M.; Gupta, Y.; Davis, N. Wireless sensor network denial of sleep attack. In Proceedings of the IEEE Workshop on Information Assurance and Security, New York, NY, USA, 15–17 June 2005; pp. 356–364. [Google Scholar]
  28. Stajano, F.; Anderson, R. The resurrecting duckling: Security issues for ad-hoc wireless networks. In Proceedings of the International Workshop on Security Protocols, London, UK, 19–21 April 1999; pp. 172–194. [Google Scholar]
  29. Capossele, A.; Cervo, V.; Petrioli, C.; Spenza, D. Counteracting Denial-of-Sleep Attacks in Wake-Up-Radio-Based Sensing Systems. In Proceedings of the IEEE International Conference on Sensing, Communication, and Networking, London, UK, 27–30 June 2016; pp. 1–9. [Google Scholar]
  30. Costa, D.G.; Figueredo, S.; Oliveira, G. Cryptography in Wireless Multimedia Sensor Networks: A Survey and Research Directions. Cryptography 2017, 1, 4. [Google Scholar] [CrossRef]
  31. Moyers, B.; Dunning, J.; Marchany, R.; Tront, J. Effects of Wi-Fi and Bluetooth Battery Exhaustion Attacks on Mobile Devices. In Proceedings of the Hawaii International Conference on System Sciences, Honolulu, HI, USA, 5–8 January 2010. [Google Scholar]
  32. Kumar, P.; Gurtov, A.; Iinatti, J.; Sain, M.; Ha, P. Access Control Protocol with Node Privacy in Wireless Sensor Networks. IEEE Sens. J. 2016, 16, 8142–8150. [Google Scholar] [CrossRef]
  33. Harn, L.; Hsu, C.-F.; Ruan, O.; Zhang, M.-Y. Novel Design of Secure End-to-End Routing Protocol in Wireless Sensor Networks. IEEE Sens. J. 2016, 16, 1779–1785. [Google Scholar] [CrossRef]
  34. Khouzani, M.; Sarkar, S. Maximum Damage Battery Depletion Attack in Mobile Sensor Networks. IEEE Trans. Autom. Control. 2011, 56, 2358–2368. [Google Scholar] [CrossRef] [Green Version]
  35. Shakhov, V. On a new type of attack in wireless sensor networks: Depletion of battery. In Proceedings of the IEEE International Forum on Strategic Technology, Novosibirsk, Russia, 1–3 June 2016; pp. 491–494. [Google Scholar]
  36. Shakhov, V.; Koo, I.; Rodionov, A. Energy exhaustion attacks in wireless networks. In Proceedings of the IEEE International Conference on Computer and Information Sciences, Novosibirsk, Russia, 18–22 September 2017; pp. 1–3. [Google Scholar]
  37. Ren, J.; Zhang, Y.; Zhang, K.; Shen, X. Adaptive and Channel-Aware Detection of Selective Forwarding Attacks in Wireless Sensor Networks. IEEE Trans. Wirel. Commun. 2016, 15, 3718–3731. [Google Scholar] [CrossRef]
  38. Katiravan, J.; Duraipandian, N.; Dharini, N. A Two level Detection of Routing layer attacks in Hierarchical Wireless Sensor Networks using learning based energy prediction. KSII Trans. Internet Inf. Syst. 2015, 9, 4644–4661. [Google Scholar]
  39. Chau, C.; Qin, F.; Sayed, S.; Wahab, M.; Yang, Y. Harnessing battery recovery effect in wireless sensor networks: Experiments and analysis. IEEE J. Sel. Areas Commun. 2010, 28, 1222–1232. [Google Scholar] [CrossRef]
  40. Zhang, Q.; Kassam, S. Finite-state Markov model for Rayleigh fading channels. IEEE Trans. Commun. 1999, 47, 1688–1692. [Google Scholar] [CrossRef]
  41. Bouabdallah, F.; Bouabdallah, N.; Boutaba, R. On balancing energy consumption in wireless sensor networks. IEEE Trans. Veh. Technol. 2009, 58, 2909–2924. [Google Scholar] [CrossRef]
  42. Meng, T.; Li, X.; Zhang, S.; Zhao, Y. A Hybrid Secure Scheme for Wireless Sensor Networks against Timing Attacks Using Continuous-Time Markov Chain and Queueing Model. Sensors 2016, 16, 1606. [Google Scholar] [CrossRef] [PubMed]
  43. Kleinrock, L. Queueing Systems; Volume I: Theory; Wiley: New York, NY, USA, 1975; pp. 72–74. [Google Scholar]
  44. Silva, I.; Guedes, L.A.; Portugal, P.; Vasques, F. Reliability and Availability Evaluation of Wireless Sensor Networks for Industrial Applications. Sensors 2012, 12, 806–838. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  45. Zhou, F.; Chen, Z.; Guo, S.; Li, J. Maximizing Lifetime of Data-Gathering Trees with Different Aggregation Modes in WSNs. IEEE Sens. J. 2016, 16, 8167–8177. [Google Scholar] [CrossRef]
  46. Iyengar, S.; Brooks, R. Distributed Sensor Networks, 2nd ed.; Chapman & Hall/CRC: Boca Raton, FL, USA, 2012; p. 444. [Google Scholar]
  47. Tsai, C.; Hong, T.; Shiu, G. Metaheuristics for the lifetime of WSN: A review. IEEE Sens. J. 2016, 16, 2812–2831. [Google Scholar] [CrossRef]
  48. Dong, M.; Ota, K.; Liu, A.; Guo, M. Joint Optimization of Lifetime and Transport Delay under Reliability Constraint Wireless Sensor Networks. Joint Optimization of Lifetime and Transport Delay under Reliability Constraint Wireless Sensor Networks. IEEE Trans. Parallel Distrib. Syst. 2016, 27, 225–236. [Google Scholar] [CrossRef]
  49. Wu, Y.; Mao, Z.; Fahmy, S.; Shroff, N. Constructing maximum lifetime data-gathering forests in sensor networks. IEEE/ACM Trans. Netw. 2010, 18, 1571–1584. [Google Scholar] [CrossRef]
  50. Wang, W.; Srinivasan, V.; Chua, K. Extending the lifetime of wireless sensor networks through mobile relays. IEEE/ACM Trans. Netw. 2008, 16, 1108–1120. [Google Scholar] [CrossRef]
  51. Ren, J.; Zhang, Y.; Zhang, K.; Liu, A.; Chen, J.; Shen, X. Lifetime and Energy Hole Evolution Analysis in Data-Gathering Wireless Sensor Networks. IEEE Trans. Ind. Inf. 2016, 12, 788–800. [Google Scholar] [CrossRef]
  52. Mahboubi, H.; Masoudimansour, W.; Aghdam, A.; Sayrafian-Pour, K. Maximum Lifetime Strategy for Target Monitoring with Controlled Node Mobility in Sensor Networks with Obstacles. IEEE Trans. Autom. Control 2016, 61, 3493–3508. [Google Scholar] [CrossRef]
  53. Han, G.; Jiang, J.; Shen, W.; Shu, L.; Rodrigues, J. IDSEP: A novel intrusion detection scheme based on energy prediction in cluster-based wireless sensor networks. IET Inf. Secur. 2013, 7, 97–105. [Google Scholar] [CrossRef]
  54. Cheng, C.; Tse, C.; Lau, F. An energy-aware scheduling scheme for wireless sensor networks. IEEE Trans. Veh. Technol. 2010, 59, 3427–3444. [Google Scholar] [CrossRef]
  55. Ho, J.-W.; Wright, M.; Das, S.K. Distributed detection of mobile malicious node attacks in wireless sensor networks. Ad Hoc Netw. 2012, 10, 512–523. [Google Scholar] [CrossRef]
  56. Sarma, H.; Mall, R.; Kar, A. E2R2: Energy-Efficient and Reliable Routing for Mobile Wireless Sensor Networks. IEEE Syst. J. 2016, 10, 604–616. [Google Scholar] [CrossRef]
  57. Tartakovsky, A.; Rozovskii, B.; Blazek, R.; Kim, H. A novel approach to detection of intrusions in computer networks via adaptive sequential and batch-sequential change-point detection methods. IEEE Trans. Signal Process. 2006, 54, 3372–3382. [Google Scholar] [CrossRef] [Green Version]
  58. Shakhov, V.V.; Choo, H.; Bang, Y. Discord model for detecting unexpected demands in mobile networks. J. Future Gen. Comput. Syst. 2004, 20, 181–188. [Google Scholar] [CrossRef]
  59. Martinez, B.; Monton, M.; Vilajosana, I.; Prades, J. The Power of Models: Modeling Power Consumption for IoT Devices. IEEE Sens. J. 2015, 15, 56–61. [Google Scholar] [CrossRef]
  60. Johnson, N.L.; Kotz, S.; Balakrishnan, N. Continuous Univariate Distributions; Wiley: New York, NY, USA, 1995; pp. 156–162. [Google Scholar]
Figure 1. Venn diagram representation of the denial-of-service (DoS) and depletion-of-battery (DoB) attacks interrelation.
Figure 1. Venn diagram representation of the denial-of-service (DoS) and depletion-of-battery (DoB) attacks interrelation.
Sensors 18 01849 g001
Figure 2. State diagram with absorbing state for sensor battery behavior.
Figure 2. State diagram with absorbing state for sensor battery behavior.
Sensors 18 01849 g002
Figure 3. State diagram of sensor modes.
Figure 3. State diagram of sensor modes.
Sensors 18 01849 g003
Figure 4. DoB attack based on excessive transmission power.
Figure 4. DoB attack based on excessive transmission power.
Sensors 18 01849 g004
Figure 5. Boxplot diagram for sensor lifetime.
Figure 5. Boxplot diagram for sensor lifetime.
Sensors 18 01849 g005
Figure 6. Behavior of the system survivability function, depending on m.
Figure 6. Behavior of the system survivability function, depending on m.
Sensors 18 01849 g006
Figure 7. System survivability and varied types of DoB.
Figure 7. System survivability and varied types of DoB.
Sensors 18 01849 g007
Figure 8. Efficiency of DoB detection.
Figure 8. Efficiency of DoB detection.
Sensors 18 01849 g008
Table 1. Detailed statistics for sensor lifetime. Min is the smallest value in the sample. Max is the largest value in the sample. Mean is the sample mean. Median is the second quartile. Q 1 and Q 3 are the first and third quartiles.
Table 1. Detailed statistics for sensor lifetime. Min is the smallest value in the sample. Max is the largest value in the sample. Mean is the sample mean. Median is the second quartile. Q 1 and Q 3 are the first and third quartiles.
ScenarioMinQ 1MedianMeanQ 3Max
Case 1209.6221.4225.2225.2228.8241.5
Case 2202.0220.0226.0225.8231.0257.0
Case 3160.4190.2199.8200.2209.6247.6
Case 4178.0196.0201.0200.8206.0229.0

Share and Cite

MDPI and ACS Style

Shakhov, V.; Koo, I. Depletion-of-Battery Attack: Specificity, Modelling and Analysis. Sensors 2018, 18, 1849. https://doi.org/10.3390/s18061849

AMA Style

Shakhov V, Koo I. Depletion-of-Battery Attack: Specificity, Modelling and Analysis. Sensors. 2018; 18(6):1849. https://doi.org/10.3390/s18061849

Chicago/Turabian Style

Shakhov, Vladimir, and Insoo Koo. 2018. "Depletion-of-Battery Attack: Specificity, Modelling and Analysis" Sensors 18, no. 6: 1849. https://doi.org/10.3390/s18061849

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop