Font Size: a A A

Security Assessment Of Io T Energy Exhausting Attacks From Wireless Sensors Perspective

Posted on:2023-12-19Degree:MasterType:Thesis
Institution:UniversityCandidate:Mazin Mohammed MogademFull Text:PDF
GTID:2568306614488764Subject:Control Science and Engineering
Abstract/Summary:PDF Full Text Request
Giant industry entities and companies like Amazon are endeavoring to get intelligent gadgets to encompass our lives in every way possible.Intelligent devices with network functions are gradually replacing traditional devices in our lives and are indispensable as intelligent devices.All these gadgets focus on profits more than the security and lifespan of these devices,which can explain why they neglect an essential piece of the puzzle.From the user’s point of view,they would prefer security and longevity,but the marketing keeps selling thoughts to them.However,the industrial entities would prefer to release many brands as soon as possible.That can affect the gadget’s regular firmware updates as the developers are busy making new models and possibly pairing them with weak components to get the job done,making them appetizing for nefarious attackers.When addressing the weak components in this scheme,we explicitly state the batteries as many gadgets rely heavily on them to power up the gadgets,and it is a very vulnerable component that does not have any security measure,but it is indispensable.The vital question is whether we want simplicity or security to resolve this inquiry that golfs our lives.Based on the repeatable impact of energy consumption,this study will focus more on the security design tenant by providing a security analysis of cyberattacks and their role in resources,system performance,and power capabilities in IoT by creating a framework for these attacks on the battery level.The exhausting energy framework is based on the energy-draining effects that they replicate to understand better the severity of these attacks on devices’ resources and abilities when conducted by nefarious individuals to exploit weaknesses.It was implemented in the Contiki OS emulator.Its potent tool can power the actual real-world devices to simulate them carefully to understand this portion of the work.This thesis illustrates the differences between conventional and modern wireless sensors,each layer’s topologies,types,architectures,security design,and attack taxonomies on WSN batteries,and how to strengthen its safety management measures by analyzing the ability of network attacks due to the influence of consumption and system performance.We employed several simulations based on the literature investigation and compared them accurately to the actual world working demand.Those six attacks were written in different papers and searched as stand-alone threats.However,their effects were studied with different metrics that measured factors such as quality of service and message redundancy,not energy depletion.We used various metrics to determine the impact on resources and energy and provided a comparison to depict the comparative gravity.The usage of powertrace in this work allows us to trace the energy at both the nodes and the whole network instead of the deficiencies when estimating the energy via radio transmission,which shows poor performance when the motes are in an idle listening mood because WSN spends a great deal of power on listening.This tool could track the overall system power(energy capsules)spent on various activities such as forwarding packets and controlling traffic to gain a network-level power profile.Our results demonstrate that specific cyberattacks can severely increase energy depletion and impact the device’s operations in the long run.At last,the investigation presented mitigation and countermeasures practices to prolong the battery life or work as a defensive barrier employed on different layers or through futuristic technological directions since the resource constraints cause many solutions to be unfit or their adaptation impossible in WSNs.Precise energy estimation at an early design stage is a crucial ingredient for designers.This deep analysis will help the production and maintenance cost and present future elasticity to address sensors and wireless communications since energy is limited and a valuable resource.As there are no well-known principles for security design,and this is reflected deeply in the abundance of research in this area and the fact that standardization can create various vulnerabilities in this realm as the security needs will not be equal in each case,causing countless concerns for billions of devices that are differing in security needs.In return,this can help us to develop a process to increase the security of data protection,discovering the vulnerabilities in the communications protocols with the existing hardening practices,and a more realistic evaluation from the security assessment and threat analysis to determine if they had the sufficient mitigation means in the face of attacks.This work will help the coming researcher analyze IoT systems from a security point of view and provide recommendations and solutions to implement them in open and secure IoT systems;therefore,it is conducive to the analysis of countermeasures that can be taken in the face of attacks.Likewise,the consumer will be the biggest winner to contribute to this market and use these products confidently because they were produced using secure tools,procedures,and secrecy.
Keywords/Search Tags:wireless sensor networks, battery, cyberattacks, energy-draining, emulator
PDF Full Text Request
Related items