A Defence against “Sleep Deprivation” Attack

[This is an old published paper. I am hosting it online to benefit CiteSeer.]

ABSTRACT
Many current and future embedded computing devices will operate from severely limited  battery power, and they will conserve this power by spending most of their time in a very low power “sleep” state. These devices can be subjected to a denial of service (DoS) attack that prevents them from entering the sleep state. This “sleep deprivation” attack is accomplished by an attacker repeatedly sending false messages until the limited battery power of the attacked device is exhausted. A defense against this attack uses a very low power authentication scheme that must be passed before the main processing elements of the sleeping device will be awakened. An implementation of this low power authentication scheme is discussed along with consideration of the broader authentication issues for the embedded computing devices.

Citation:

Vinay M. Igure, T. N. Blalock, R. D. Williams, “A Defense against ‘Sleep‐Deprivation’ Attack,” IASTED International Conference on Communications and Computer Networks (CCN2002,) November 4‐6, 2002 MIT Cambridge, Massachusetts.

Full PDF of Paper: Sleep_Deprivation

This entry was posted in Published Papers. Bookmark the permalink.

Leave a comment