Concetti Chiave
A lightweight algorithm to detect energy consumption attacks on smart home devices by monitoring their packet reception rates across different protocols.
Sintesi
The paper presents a lightweight algorithm to detect energy consumption attacks on smart home devices. The key aspects are:
- The algorithm considers three popular IoT protocols - TCP, UDP, and MQTT - and analyzes the packet reception rate of the devices under normal and attack conditions.
- It also takes into account different device statuses - idle, active, and under attack - to accurately differentiate normal and abnormal packet reception behaviors.
- The algorithm measures the energy consumption of the smart devices in parallel to determine if the observed packet reception patterns are caused by an energy consumption attack.
- It uses a multi-stage approach to classify the device behavior as normal or abnormal, triggering an alert if the abnormal behavior persists beyond a threshold.
- The proposed technique is designed to be lightweight and resource-efficient, making it suitable for deployment directly on the resource-constrained smart home devices.
- Experiments on a Raspberry Pi testbed show the algorithm can effectively detect energy consumption attacks by analyzing the packet reception rates across different protocols.
Statistiche
The normal average of the received packets for the TCP protocol in 30 minutes fluctuates between 2,000 and 6,000 packets.
The abnormal behavior of the received packets by the smart device for the UDP protocol is between 9,000 and more than 12,000 packets.
The normal behavior of the packet reception rate of the Raspberry Pi is between 1,500 packets and less than or equal to 6,000 packets, while the abnormal behavior is between 7,000 and more than 12,000 packets.
Citazioni
"One of the critical tasks to be solved by the concept of a modern smart home is the problem of preventing energy attacks spread and the usage of IoT infrastructure."
"Monitoring the energy consumption of IoT devices is a possible way to detect those performing attacks which require significant energy consumption."