Research Area:  Internet of Things
Many IoT devices, especially those deployed at the network edge have limited power resources. In this work, we study the effects of a variety of battery draining attacks against edge nodes. Specifically, we implemented hello flooding, packet flooding, selective forwarding, rank attack, and versioning attack in ContikiOS and simulated them in the Cooja simulator. We consider a number of relevant metrics, such as CPU time, low power mode time, TX/RX time, and battery consumption. Besides, we test the stretch attack with three different batteries as an extreme scenario. Our results show that versioning attack is the most severe in terms of draining the power resources of the network, followed by packet flooding and hello flooding attacks. Furthermore, we find that selective forwarding and rank attacks are not able to considerably increase the power resource usage in our scenarios. By quantifying the effects of these attacks, we demonstrate that under specific scenarios, versioning attack can be three to four times as effective as packet flooding and hello flooding attacks in wasting network resources. At the same time, packet flooding is generally comparable to hello flooding in CPU and TX time usage increase but twice as powerful in draining device batteries.
Author(s) Name:  Ryan Smith,Daniel Palin,Philokypros P. Ioulianou,Vassilios G. Vassilakis,Siamak F. Shahandashti
Journal name:  Cyber-Physical Systems
Publisher name:  Taylor and Francis
Volume Information:  Volume 6, 2020 - Issue 2 ,Pages 96-116
Paper Link:   https://www.tandfonline.com/doi/abs/10.1080/23335777.2020.1716268?journalCode=tcyb20