배터리 소모 공격에 대응하는 저전력 웨이크업 리시버의 적응형 파워 세이빙 메커니즘

Vol. 34, No. 3, pp. 393-401, 6월. 2024
10.13089/JKIISC.2024.34.3.393, Full Text:
Keywords: Wake-up receiver, Adaptive power-save mechanism, Battery draining attack, Low-power security mechanism
Abstract

Recently, the Internet of Things (IoT) has been widely used in industries and daily life that directly affect human safety, life, and assets. However, IoT devices, which need to meet low-cost, lightweight, and low-power requirements, face a significant problem of shortened battery lifetime due to battery draining attacks and interference. To solve this problem, the 802.11ba standard for the Wake-up Receiver (WuR) has emerged, this feature is playing a crucial role in minimizing energy consumption. However, the WuR protocol did not consider security mechanisms in order to reduce latency and overhead. Therefore, in this study, an Adaptive Power Saving Mechanism (APSM) is proposed for low-power WuR to counter battery draining attacks. APSM can minimize abnormally occurring power consumption by exponentially increasing power-saving time in environments prone to attacks. According to experimental results, the proposed APSM improved energy consumption efficiency by a minimum of 13.77% compared to the traditional Legacy Power Saving Mechanism (LPSM) when attack traffic ratio is 10% or more of the total traffic.

Statistics
Show / Hide Statistics

Statistics (Cumulative Counts from December 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article
[IEEE Style]
김소연, 이일구, 윤성원, "Adaptive Power Saving Mechanism of Low Power Wake-up Receivers against Battery Draining Attack," Journal of The Korea Institute of Information Security and Cryptology, vol. 34, no. 3, pp. 393-401, 2024. DOI: 10.13089/JKIISC.2024.34.3.393.

[ACM Style]
김소연, 이일구, and 윤성원. 2024. Adaptive Power Saving Mechanism of Low Power Wake-up Receivers against Battery Draining Attack. Journal of The Korea Institute of Information Security and Cryptology, 34, 3, (2024), 393-401. DOI: 10.13089/JKIISC.2024.34.3.393.