Detection of Energy Consumption Cyber Attacks on Smart Devices

Zainab Alwaisi,Simone Soderi,Rocco De Nicola
DOI: https://doi.org/10.1007/978-3-031-50051-0_12
2024-10-15
Abstract:With the rapid development of Internet of Things (IoT) technology, intelligent systems are increasingly integrating into everyday life and people's homes. However, the proliferation of these technologies raises concerns about the security of smart home devices. These devices often face resource constraints and may connect to unreliable networks, posing risks to the data they handle. Securing IoT technology is crucial due to the sensitive data involved. Preventing energy attacks and ensuring the security of IoT infrastructure are key challenges in modern smart homes. Monitoring energy consumption can be an effective approach to detecting abnormal behavior and IoT cyberattacks. Lightweight algorithms are necessary to accommodate the resource limitations of IoT devices. This paper presents a lightweight technique for detecting energy consumption attacks on smart home devices by analyzing received packets. The proposed algorithm considers TCP, UDP, and MQTT protocols, as well as device statuses (Idle, active, under attack). It accounts for resource constraints and promptly alerts administrators upon detecting an attack. The proposed approach effectively identifies energy consumption attacks by measuring packet reception rates for different protocols.
Cryptography and Security
What problem does this paper attempt to address?
### What problems does this paper attempt to solve? This paper aims to solve the problem of energy - consuming network attacks faced by smart devices in the smart home environment. With the rapid development of Internet of Things (IoT) technology, smart systems are increasingly integrated into daily life and households. However, these smart devices are usually resource - constrained and may be connected to unreliable or insecure networks, which makes them vulnerable to various forms of network attacks, especially energy - consuming attacks. Specifically, the paper focuses on the following aspects: 1. **Security of smart devices**: Due to limited resources (such as computing power and battery life) of smart devices, traditional security measures are difficult to be directly applied. Therefore, it is necessary to develop a lightweight algorithm to detect and prevent energy - consuming attacks while considering the resource limitations of the devices. 2. **Detection of energy - consuming attacks**: By monitoring the energy - consuming patterns of smart devices, abnormal behaviors can be identified. For example, malicious activities such as Distributed Denial of Service (DDoS) attacks and cryptocurrency mining will significantly increase the energy consumption of devices. Therefore, by analyzing the packet reception rate and energy consumption of devices, these attacks can be effectively detected. 3. **Real - time monitoring and response**: In order to ensure timely discovery and response to potential attacks, the algorithm needs to be able to monitor the state of the device in real - time and immediately notify the administrator when abnormal behaviors are detected. 4. **Support for different protocols**: Considering that smart devices use multiple communication protocols (such as TCP, UDP and MQTT), the algorithm needs to be able to handle the packet reception rates under different protocols and adjust according to the protocol characteristics. 5. **Adaptability to different device states**: Smart devices may be in different working states (such as idle, active or under attack). The algorithm needs to be able to distinguish these states and make judgments based on the behavior patterns in different states. In summary, the core problem of this paper is to develop a lightweight algorithm that is suitable for resource - constrained environments to detect energy - consuming attacks in smart home devices and achieve this goal by real - time monitoring of packet reception rates and energy consumption.