You are currently viewing a new version of our website. To view the old version click .
Sensors
  • Article
  • Open Access

5 April 2020

Battery Draining Attack and Defense against Power Saving Wireless LAN Devices

,
and
1
Department of Convergence Security Engineering, Sungshin University, Seoul 02844, Korea
2
Department of Computer Engineering, Pai Chai University Daejeon 35345, Korea
3
Department of Electronics Engineering and Applied Communications Research Center, Hankuk University of Foreign Studies, Yongin 17035, Korea
*
Author to whom correspondence should be addressed.
This article belongs to the Special Issue Security and Privacy in Wireless Sensor Network

Abstract

Wi-Fi technology connects sensor-based things that operate with small batteries, and allows them to access the Internet from anywhere at any time and perform networking. It has become a critical element in many areas of daily life and industry, including smart homes, smart factories, smart grids, and smart cities. The Wi-Fi-based Internet of things is gradually expanding its range of uses from new industries to areas that are intimately connected to people’s lives, safety, and property. Wi-Fi technology has undergone a 20-year standardization process and continues to evolve to improve transmission speeds and service quality. Simultaneously, it has also been strengthening power-saving technology and security technology to improve energy efficiency and security while maintaining backward compatibility with past standards. This study analyzed the security vulnerabilities of the Wi-Fi power-saving mechanism used in smart devices and experimentally proved the feasibility of a battery draining attack (BDA) on commercial smartphones. The results of the experiment showed that when a battery draining attack was performed on power-saving Wi-Fi, 14 times the amount of energy was consumed compared with when a battery draining attack was not performed. This study analyzed the security vulnerabilities of the power-saving mechanism and discusses countermeasures.

1. Introduction

Recently, Internet of things (IoT) connectivity technologies have become essential in all areas of daily life, public infrastructure, industry, and business. Society has entered the IoT era of new value creation, where communication network technologies between things, and things with each other, enable them to interact [,]. As traditional sensor applications require tiny amounts of intermittent data transmission, they can be considered traditional sensor communication technologies []. However, recently emerged IoT applications have increased the requirements for high-definition video and high-quality sound, transmitting vast amounts of data, utilizing broadband service coverage, and having low power consumption and high efficiency [,,]. For the existing communication methods applied to home routers and smart home appliances, additional costs are required to build smart home networks due to coverage limitations [,]. Furthermore, for the existing communication methods applied to industrial IoT, the data transmission rate and distance limitations cause low communication quality and energy efficiency problems [,]. In addition, when building an advanced metering infrastructure (AMI) and data collector unit (DCU), backhaul networks for long-distance distribution facility monitoring, factory facility detection, and diagnostic systems, due to their large number of nodes, should transmit and receive real-time data in broadband; the data rate and service coverage of existing sensor network technologies are insufficient [,]. Furthermore, recently emergent security cameras and Artificial Intelligence (AI)-based applications require high resolution and high computing power, and data requirements are increasing due to IoT convergence that supports various functions [,]. In medical healthcare smart devices, intelligence and security embedded solutions are needed for ambient assisted living []. Therefore, Wi-Fi technologies have attracted attention as a powerful IoT connectivity solution [,]. IEEE 802.11 standardization began in the 1990s, with the goal of supporting 1 Mbps transfer rates in the 2.4 GHz band for unlicensed band personal wireless applications []. Since then, under the name Wireless Fidelity (Wi-Fi), IEEE 802.11 has become the representative wireless communication technology protocol for accessing wireless Internet in offices, homes, airports, hotels, restaurants, trains, planes, etc., and as smart devices become ubiquitous, they have become essential in daily life []. The standards are currently divided into the 802.11a/b/g/n/ac/ax series that aim for ultra-fast transmissions in dense networks utilizing 2.4/5 GHz Industrial Scientific and Medical (ISM) band frequencies, and the 802.11af/ah series for IoT wide area network services in sub 1 GHz bands [,,].
This study undertook a battery draining attack (BDA) on a commercial smartphone adopting IEEE 802.11a/b/g/n/ac to prove the existence of security vulnerabilities experimentally in the Wi-Fi power-saving mechanism. Similar to most technologies, when Wi-Fi’s power-saving mechanisms were introduced, they were designed and standardized with a focus on performance and QoS rather than security, and it was difficult to consider the security threats that would arise in the future when designing the technology. Wi-Fi has lasted for two decades, and its areas of use have expanded dramatically compared with those in the past, which has added to the severity of the problem. This is because Wi-Fi provides backward compatibility, indicating that the security vulnerabilities of the power-saving mechanism of the early period are still present in the later Wi-Fi standards.
Based on the technological background, this study analyzed the security vulnerabilities of the power-saving mechanism and experimentally proved that malicious attackers can exploit these vulnerabilities by continuously transmitting wake-up trigger frames during a doze mode to cause power consumption, and they can increase the efficiency of the battery draining attack by training the trigger frames.
This study makes the following three major contributions:
First, it shows the security vulnerabilities in the power-saving mechanism of the Wi-Fi standard and the validity of the power-saving security vulnerabilities by performing experiments on commercial smartphones.
Second, it analyzes the security vulnerabilities of the Wi-Fi power-saving mechanism based on experimental results in the real world and proposes countermeasures.
Third, it discusses the security remedies and presents a feasible defense technique against the battery draining attack.
The rest of this paper is organized as follows. Section 2 describes the background and discusses related works. Section 3 describes the security vulnerabilities of Wi-Fi and potential battery draining attack. Section 4 discusses the experimental setup and results. Section 5 describes and analyzes the necessary security measures. Finally, Section 6 presents the conclusions.

3. Battery Draining Attack against Power-Saving WLAN Devices

The legacy power-saving mechanism of Wi-Fi technologies has two security vulnerabilities.
First, the wireless stations switch to wake mode depending solely on the TIM bit of the beacon frame, which is unverifiable. Therefore, an attacker can keep a station awake by sniffing the beacon frames when there are buffered packets at the AP and sending a fake beacon frame. After waking the target station, the attacker can cause it to consume energy by processing fake frames.
Second, the Wi-Fi standard defines the power-saving mechanism as being operated by the beacon frame, but actual implemented systems maintain and improve processing speed and QoS even if power saving is active by extending the wake mode so that a new frame is received at a time when a power-saving interval must be entered. Therefore, when an attacker continuously sends fake frames to an attack target, the attack target continuously extends the wake mode. Consequently, the power-saving mode cannot be activated, and severe power consumption occurs.
Figure 2 shows the network configuration for the battery draining attack. The AP and station are associated and connected to each other. The station is in power-saving mode. It periodically receives the beacon signal from the AP and performs power saving. At this point, the attacker sends a trigger signal to the station and causes the transmission of a response frame. The station becomes the victim of the attacker as it is unable to enter the doze mode and continuously transmits response frames and consumes power.
Figure 2. Network configuration for the battery draining attack.
Figure 3 shows a timing diagram of the battery draining attack. As the target station performs power saving, it is periodically woken to receive the beacon frames sent by the AP, and the power-saving mechanism operates. At this point, the attacker finds the attack target station and then sends a trigger frame. When the attacker periodically sends a trigger frame, the target station is triggered and sends a response frame. The wake mode of the target is extended by this periodic operation process. If another trigger frame is sent before the extended wake mode interval is finished, the wake mode is extended. If trigger frames are sent at fixed intervals in this way, the attack target cannot enter the power-saving mode. Consequently, the target station consumes power to receive the triggering frames and send the response frames, and it cannot perform power saving for the length of the extended wake mode time. As it sends response frames from a waking state, its power consumption is increased.
Figure 3. Timing diagram for the battery draining attack.

4. Experimental Setup and Evaluation Results

Figure 4 shows the experimental setup and the network configuration. The experimental setup of the attacker consisted of a Wi-Fi packet generating device, commercial AP, and commercial smartphone. A field-programmable gate array was used to implement the Wi-Fi packet generating device so that it could generate a standard IEEE 802.11a/b/g/n/ac Wi-Fi signal in the 2.4/5 GHz frequency band. The commercial AP was a 2.4/5 GHz dual band wireless AP. For the commercial smartphone, a comparative analysis was performed on products from two different manufacturers, which were tested together. The Wi-Fi packet generating device performed the role of the attacker, and a software controller was used to perform a battery draining attack. The network consisted of the AP, stations, and the attacker. The stations were the commercial cellphones that were the targets of the attack. To verify the battery draining effect of the attack, the phones were set to airplane mode and then the WLAN wireless interface was turned on. The cellular radio, Bluetooth, and NFC wireless interfaces and applications were all turned off. In this study, the remaining amount of battery shown by the smartphone was used to measure the relative power consumption caused by the battery draining attack [,]. The test was performed when the remaining battery of the smartphone was 20%. The frame format was the IEEE 802.11a/n/ac standard format. The frame lengths were 40 bytes and 800 bytes.
Figure 4. Experimental setup and network configuration.
Figure 5 shows the results of the battery draining attack experiment. The experiment results show the amount of remaining battery in the smartphones made by Company S1 and Company S2 according to whether an attack occurred and the attack type. When there was no attack (w/o attack), the normal power consumption of a power-saving Wi-Fi device occurred. However, during the battery draining attack, triggering frames were used to prevent power saving from occurring. To determine the difference between manufacturers, the manufacturers S1 and S2 were compared in the w/o attack case and the 802.11a standard frame case. To determine the effect of frame length in the 802.11n and 802.11ac formats on the S1 smartphone, tests were performed with 40-byte and 800-byte frame lengths. When the attacker did not perform the attack, the station operated in the normal power-saving mode, and the power consumption efficiency was good. When the attacker began the attack, the power consumption increased significantly.
Figure 5. Evaluation results of the battery draining attack.
The experiments show that when the attacker periodically sent frames, the target station was triggered to send response frames even though it was using a power-saving mode. Furthermore, when the triggering frame length was shorter, the target was awakened more often, and the power consumption became more severe. When the frame size was the same, the transmission speed of 802.11ac was faster than that of 802.11n, and the number of times that the target was triggered to send response frames was greater per unit time, making the power consumption more severe. According to the experiment results, the power consumption per unit time increased by a factor of 14 when the battery draining attack was performed in this study compared with when normal power-saving occurred without an attack.
Figure 6 shows an analysis of the experiment results. Although a verification mechanism and protocol are used for the state transitions of the power-saving mechanisms, such as TIM, PS-Poll, and the “More bit,” existing commercial Wi-Fi devices are vulnerable to this battery draining attack, and the wake status can be continually extended before entering the power-saving mode. In short, the Wi-Fi power-saving security vulnerability exists so that priority can be given to processing and responding to received frames to improve performance and QoS.
Figure 6. Awaken time extension analysis.
Figure 7 shows the results of the experiments on the power consumption of the attack target according to the triggering interval. The effect of the battery draining attack tested in this study can be optimized by finding a suitable triggering interval, transmission speed, and packet size, and then by adjusting the parameters and observing the response of the target. Consequently, the attacker can cause the attack target to shut down in a short amount of time. According to the experiment results, more than 14% of power was consumed when the triggering interval was set to 50–90 µs. When the triggering interval was less than 40 µs, the transmission time of the response frame overlapped with that of the next triggering frame, and therefore, the attack was not effective. When the triggering interval was greater than 100 µs, the time until the next triggering frame exceeded the time limit in which the awake time of the target can be extended, and the attack was not effective. As shown in the experiments, the attacker can observe the response frame and train the triggering frame interval to determine the suitable frame interval.
Figure 7. Triggering interval vs. battery drained power.

5. Discussions and Analysis on Security Remedies

To improve performance and QoS, Wi-Fi implements a method that extends the wake mode until the received frames are processed before entering the power-saving mode. However, this action is not always valid, and it is vulnerable to the battery draining attack, as shown in this study. Therefore, this paper proposes the incorporation of two security measures to prevent the battery draining attack on power-saving Wi-Fi.
First, power-saving devices are implemented so that the wake state can be extended by RTS or a data frame, and they periodically switch between wake mode and doze mode to perform power saving. These devices can be implemented so that the wake mode is maintained only by beacon frames. If they are implemented thus, direct battery draining attacks will become difficult. Attacks will be difficult to perform because they must be performed through the AP, or rogue AP attacks must be performed.
Second, the station should extend the wake mode only when a shared secret key in the received frame is checked and observed to match, and not simply when a frame arrives or a certain field value has been set. If the shared secret key does not match, the station changes from power-saving mode to sleep mode. If attacks are frequent, it enters a deep sleep and does not respond to triggering signals for a long time.
However, the above two methods have the problem of either revising the existing standards or modifying the implemented chipsets. To improve the security of the existing Wi-Fi chipsets that contain the vulnerabilities to the battery draining attacks, the Wi-Fi power switching method was tested in this study. The Wi-Fi power switching method can be applied with either a firmware or software level patch even if a traditional chipset is used. This is because if a repeat triggering frame is detected, the Wi-Fi function can be switched off and the attack can be monitored again after the power-off duration. The power-off duration can be increased several times or exponentially depending on the number of repeated detection of attacks. If a battery draining attack is detected by monitoring the repeated triggering frames, it is designed to prevent the worst-case scenario when the main system is shut down by powering off. The Wi-Fi power switching method powers off only the Wi-Fi functions and maintains other activities in the system. In the Wi-Fi power-off state, the main system stores the data in memory. When it needs to transfer the stored data to the AP, it powers on and transfers the stored data. Figure 8 shows the defense efficiency against a battery draining attack when the Wi-Fi power switching method is applied. In this experiment, 11ac mode 40-byte length frames with a trigger interval 80 µs were applied for attack and measured the drained power at intervals of one to three hours with a one-hour step. In this test, the power-off state duration was increased by 2^n minutes, where n is the cumulative number of attack detections.
Figure 8. Evaluation results on the Wi-Fi power switching method.
Figure 9 shows the power state diagram for the proposed Wi-Fi power switching method. There are five states of Wi-Fi devices. The TX, RX, and LISTEN states are parts of the active mode, and the power-save (PS) and power-off (PO) states are parts of the Wi-Fi doze mode. In the active mode, the wireless device is in an awake state and actively transmits/receives data with the access point. If the wireless device determines it is not being paged, it enters the power-save state. Otherwise, it enters the awake state for a certain period of time to receive the data frames. The Wi-Fi power switching method turns the Wi-Fi radio off when a battery draining attack (BDA) is detected.
Figure 9. Wi-Fi power state diagram.
The conventional Wi-Fi power saving method changes the sleep mode and awake mode periodically to receive the beacon signal sent by the AP for determining whether it will remain awake or not. On the other hand, for defense against the battery draining attack, the Wi-Fi power switching method powers on only when the uplink transmission is required, and downlink transmission is not supported. Assuming a single channel condition, there is a trade-off relationship between security against battery draining attacks and downlink performance for link throughput. However, if the Wi-Fi power switching method is used in an environment where multiple channels are available, the downlink performance loss can also be prevented by channel switching if the draining attack persists during power-on. In some cases, as in the [] paper, there may be persistent attacks by device tracking, which requires further study of these advanced attacks.

6. Conclusions

In the IoT era, Wi-Fi has a wide range of uses intimately connected to people’s lives, safety, and property, such as smart homes, smart grids, smart cities, connected cars, traffic infrastructure, and medical implantable devices. Wi-Fi was been developed with backward compatibility, and the impact and power of its vulnerabilities have become stronger during its evolution. As such, security for battery life and the power-saving mechanisms of Wi-Fi applications has become a factor of primary importance. This study performed a battery draining attack on the power-saving Wi-Fi of existing commercial smartphones and analyzed the limitations of existing Wi-Fi power-saving technology and implementations.
The security vulnerabilities demonstrated in the experiments in this study occurred because the power-saving protocol was designed and implemented with a focus on performance and QoS. To resolve the vulnerabilities, it is possible to perform safe power-saving by limiting the types of frames that can extend the wake mode and verifying a shared secret key to determine whether the wake mode will be extended if the standards and implemented design are modified. Otherwise, it is possible to adopt the fetched version including defense mechanisms such as a Wi-Fi power switching scheme.
Future studies will use mathematical and theoretical modeling to simulate and analyze battery draining attacks and defenses, and they will use various battery draining attack scenarios to verify the validity of the defense method proposed in this paper.

Author Contributions

I.-G.L. conceived the research idea; established the research methodology; implemented, evaluated, and analyzed the security vulnerabilities; and conducted the writing and editing. K.G. studied and formulated the structure of the experimental model. J.H.L. verified the model and conducted writing, reviewing, and editing. All authors have read and agreed to the final version of the manuscript.

Funding

This work was supported by the Sungshin Women’s University Research Grant of 2018-2-82-009.

Conflicts of Interest

The authors declare no conflict of interest.

Abbreviations

The following abbreviations are used in this manuscript:
IoTInternet of things
AMIAdvanced Metering Infrastructure
DCUData Collector Unit
AIArtificial Intelligence
Wi-FiWireless Fidelity
ISMIndustrial Scientific and Medical
CMOSComplementary Metal-Oxide-Semiconductor
WLANWireless Local Area Network
STAStation
CSMA/CACarrier Sensing Multiple Access/Collision Avoidance
QoSQuality of Service
PSMPower Saving Mode
APAccess Point
TIMTraffic Indication Map
AIDAssociation ID
PS-PollPS-Poll
ASPDAutomatic Power Save Delivery
WMMWi-Fi Multi-Media
RTSRequest To Send
CTSClear To Send
MACMedium Access Control

References

  1. Palattella, M.R.; Dohler, M.; Grieco, A.; Rizzo, G.; Torsner, J.; Engel, T.; Ladid, L. Internet of things in the 5G era: Enablers, architecture, and business models. IEEE J. Sel. Areas Commun. 2016, 34, 510–527. [Google Scholar] [CrossRef]
  2. Lin, J.; Yu, W.; Zhang, N.; Yang, X.; Zhang, H.; Zhao, W. A survey on internet of things: Architecture, enabling technologies, security and privacy, and applications. IEEE Internet Things J. 2017, 4, 1125–1142. [Google Scholar] [CrossRef]
  3. Zorzi, M.; Gluhak, A.; Lange, S.; Bassi, A. From today’s intranet of things to a future internet of things: A wireless-and mobility-related view. IEEE Wirel. Commun. 2010, 17, 44–51. [Google Scholar] [CrossRef]
  4. Čolaković, A.; Hadžialić, M. Internet of Things (IoT): A review of enabling technologies, challenges, and open research issues. Comput. Netw. 2018, 144, 17–39. [Google Scholar] [CrossRef]
  5. Akpakwu, G.A.; Silva, B.J.; Hancke, G.P.; Abu-Mahfouz, A.M. A survey on 5G networks for the Internet of Things: Communication technologies and challenges. IEEE Access 2017, 6, 3619–3647. [Google Scholar] [CrossRef]
  6. Bembe, M.; Abu-Mahfouz, A.; Masonta, M.; Ngqondi, T. A survey on low-power wide area networks for IoT applications. Telecommun. Syst. 2019, 71, 249–274. [Google Scholar] [CrossRef]
  7. Asghari, P.; Rahmani, A.M.; Javadi, H.H.S. Internet of Things applications: A systematic review. Comput. Netw. 2019, 148, 241–261. [Google Scholar] [CrossRef]
  8. Sanchez-Iborra, R.; Cano, M.D. State of the art in LP-WAN solutions for industrial IoT services. Sensors 2016, 16, 708. [Google Scholar] [CrossRef]
  9. Chang, K.H. Bluetooth: A viable solution for IoT? [Industry Perspectives]. IEEE Wirel. Commun. 2014, 21, 6–7. [Google Scholar] [CrossRef]
  10. Bi, Z.; Da Xu, L.; Wang, C. Internet of things for enterprise systems of modern manufacturing. IEEE Trans. Ind. Inform. 2014, 10, 1537–1546. [Google Scholar]
  11. Tushar, W.; Wijerathne, N.; Li, W.T.; Yuen, C.; Poor, H.V.; Saha, T.K.; Wood, K.L. Internet of things for green building management: Disruptive innovations through low-cost sensor technology and artificial intelligence. IEEE Signal Process. Mag. 2018, 35, 100–110. [Google Scholar] [CrossRef]
  12. Babu, N.T.; Stewart, C. Energy, latency and staleness tradeoffs in ai-driven iot. In Proceedings of the 4th ACM/IEEE Symposium on Edge Computing, Arlington, VA, USA, 7–9 November 2019; pp. 425–430. [Google Scholar]
  13. Korzun, D.G.; Nikolaevskiy, I.; Gurtov, A. Service intelligence and communication security for ambient assisted living. Int. J. Embed. Real-Time Commun. Syst. (IJERTCS) 2015, 6, 76–100. [Google Scholar] [CrossRef]
  14. Jones, V.K.; Sampath, H. Emerging technologies for WLAN. IEEE Commun. Mag. 2015, 53, 141–149. [Google Scholar] [CrossRef]
  15. Khorov, E.; Lyakhov, A.; Krotov, A.; Guschin, A. A survey on IEEE 802.11 ah: An enabling networking technology for smart cities. Comput. Commun. 2015, 58, 53–69. [Google Scholar] [CrossRef]
  16. Perahia, E.; Stacey, R. Next Generation Wireless LANs: 802.11 n and 802.11 ac; Cambridge University Press: Cambridge, UK, 2013. [Google Scholar]
  17. Khorov, E.; Kiryanov, A.; Lyakhov, A.; Bianchi, G. A tutorial on IEEE 802.11 ax high efficiency WLANs. IEEE Commun. Surv. Tutor. 2018, 21, 197–216. [Google Scholar] [CrossRef]
  18. Adame, T.; Bel, A.; Bellalta, B.; Barcelo, J.; Oliver, M. IEEE 802.11 ah: The WiFi approach for M2M communications. IEEE Wirel. Commun. 2014, 21, 144–152. [Google Scholar] [CrossRef]
  19. IEEE. 802.11ac-2013—IEEE Standard for Information technology—Telecommunications and Information Exchange between Systems Local and Metropolitan Area Networks—Specific Requirements—Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications—Amendment 4: Enhancements for Very High Throughput for Operation in Bands below 6 GHz; IEEE: Piscataway, NJ, USA, 2013. [Google Scholar]
  20. IEEE. P802.11ah-2014, Draft 2.0, Draft Standard for Information Technology—Telecommunications and Information Exchange between Systems Local and Metropolitan Area Networks—Specific Requirements—Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications—Amendment 6: Sub 1 GHz License Exempt Operation; IEEE: Piscataway, NJ, USA, 2014. [Google Scholar]
  21. Van Nee, R. Breaking the gigabit-per-second barrier with 802.11 ac. IEEE Wirel. Commun. 2011, 18, 4. [Google Scholar]
  22. Verma, L.; Fakharzadeh, M.; Choi, S. Wifi on steroids: 802.11 ac and 802.11 ad. IEEE Wirel. Commun. 2013, 20, 30–35. [Google Scholar] [CrossRef]
  23. Bellalta, B.; Bononi, L.; Bruno, R.; Kassler, A. Next generation IEEE 802.11 Wireless Local Area Networks: Current status, future directions and open challenges. Comput. Commun. 2016, 75, 1–25. [Google Scholar] [CrossRef]
  24. Lee, I.G.; Kim, M. IAPS: Interference aware power saving for high-efficiency wireless LANs in dense networks. IEEE Commun. Lett. 2015, 19, 2238–2241. [Google Scholar] [CrossRef]
  25. Chandrakasan, A.P.; Brodersen, R.W. Minimizing power consumption in digital CMOS circuits. Proc. IEEE 1995, 83, 498–523. [Google Scholar] [CrossRef]
  26. Martinez, B.; Monton, M.; Vilajosana, I.; Prades, J.D. The power of models: Modeling power consumption for IoT devices. IEEE Sens. J. 2015, 15, 5777–5789. [Google Scholar] [CrossRef]
  27. Wang, Q.; Hempstead, M.; Yang, W. A realistic power consumption model for wireless sensor network devices. In Proceedings of the 2006 3rd Annual IEEE Communications Society on Sensor and Ad Hoc Communications and Networks, Reston, VA, USA, 28 September 2006; Volume 1, pp. 286–295. [Google Scholar]
  28. IEEE. 802.11e-2005—IEEE Standard for Information Technology—Local and Metropolitan Area Networks—Specific Requirements—Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications—Amendment 8: Medium Access Control (MAC) Quality of Service Enhancements; IEEE: Piscataway, NJ, USA, 2005. [Google Scholar]
  29. Wu, F.; Wu, T.; Yuce, M.R. An internet-of-things (IoT) network system for connected safety and health monitoring applications. Sensors 2019, 19, 21. [Google Scholar] [CrossRef] [PubMed]
  30. Zanella, A.; Bui, N.; Castellani, A.; Vangelista, L.; Zorzi, M. Internet of things for smart cities. IEEE Internet Things J. 2014, 1, 22–32. [Google Scholar] [CrossRef]
  31. Bathilde, J.B.; Then, Y.L.; Chameera, R.; Tay, F.S.; Zaidel, D.N.A. Continuous heart rate monitoring system as an IoT edge device. In Proceedings of the 2018 IEEE Sensors Applications Symposium (SAS), Seoul, South Korea, 12–14 March 2018; pp. 1–6. [Google Scholar]
  32. Saleem, Y.; Crespi, N.; Rehmani, M.H.; Copeland, R. Internet of things-aided smart grid: Technologies, architectures, applications, prototypes, and future research directions. IEEE Access 2019, 7, 62962–63003. [Google Scholar] [CrossRef]
  33. Yaqoob, T.; Abbas, H.; Atiquzzaman, M. Security Vulnerabilities, Attacks, Countermeasures, and Regulations of Networked Medical Devices—A Review. IEEE Commun. Surv. Tutor. 2019, 21, 3723–3768. [Google Scholar] [CrossRef]
  34. Butun, I.; Österberg, P.; Song, H. Security of the internet of things: Vulnerabilities, attacks and countermeasures. IEEE Commun. Surv. Tutor. 2019, 22, 616–644. [Google Scholar] [CrossRef]
  35. Tauber, M.; Bhatti, S.N. The effect of the 802.11 power save mechanism (PSM) on energy efficiency and performance during system activity. In Proceedings of the 2012 IEEE International Conference on Green Computing and Communications, Besancon, France, 20–23 November 2012; pp. 573–580. [Google Scholar]
  36. Pefkianakis, I.; Lin, C.Y.; Lu, S. What is wrong/right with IEEE 802.11 n spatial multiplexing power save feature? In Proceedings of the 2011 19th IEEE International Conference on Network Protocols, Vancouver, BC, Canada, 17–20 October 2011; pp. 186–195. [Google Scholar]
  37. Li, J.; Lu, Y. Network traffic adaptive S-MAC protocol for wireless sensor network. In Proceedings of the 2018 Symposium on Architectures for Networking and Communications Systems, Ithaca, NY, USA, 23–24 July 2018; pp. 156–157. [Google Scholar]
  38. Demirkol, I.; Ersoy, C.; Alagoz, F. MAC protocols for wireless sensor networks: A survey. IEEE Commun. Mag. 2006, 44, 115–121. [Google Scholar] [CrossRef]
  39. Capossele, A.T.; Cervo, V.; Petrioli, C.; Spenza, D. Counteracting denial-of-sleep attacks in wake-up-radio-based sensing systems. In Proceedings of the 2016 13th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON), London, UK, 27–30 June 2016; pp. 1–9. [Google Scholar]
  40. Raymond, D.R.; Marchany, R.C.; Brownfield, M.I.; Midkiff, S.F. Effects of denial-of-sleep attacks on wireless sensor network MAC protocols. IEEE Trans. Veh. Technol. 2008, 58, 367–380. [Google Scholar] [CrossRef]
  41. Vasserman, E.Y.; Hopper, N. Vampire attacks: Draining life from wireless ad hoc sensor networks. IEEE Trans. Mob. Comput. 2011, 12, 318–332. [Google Scholar] [CrossRef]
  42. Lee, I.G.; Choi, H.; Kim, Y.; Shin, S.; Kim, M. Run Away If You Can: Persistent Jamming Attacks against Channel Hopping Wi-Fi Devices in Dense Networks. In Proceedings of the International Workshop on Recent Advances in Intrusion Detection; Gothenburg, Sweden, 17–19 September 2014, pp. 362–383.
  43. Rahmati, A.; Zhong, L. Studying smartphone usage: Lessons from a four-month field study. IEEE Trans. Mob. Comput. 2012, 12, 1417–1427. [Google Scholar] [CrossRef]
  44. Dixon, B.; Mishra, S. Power based malicious code detection techniques for smartphones. In Proceedings of the 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Melbourne, Australia, 16–18 July 2013; pp. 142–149. [Google Scholar]

Article Metrics

Citations

Article Access Statistics

Multiple requests from the same IP address are counted as one view.