Protecting RESTful IoT Devices from Battery Exhaustion DoS Attacks

2020 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)(2020)

引用 11|浏览3
暂无评分
摘要
Many IoT use cases involve constrained battery powered devices offering services in a RESTful manner to their communication partners. Such services may involve, e.g., costly computations or actuator/sensor usage, which may have significant influence on the power consumption of the service Providers. Remote attackers may excessively use those services in order to exhaust the Providers' batteries, which is a form of a Denial of Service (DoS) attack. Previous work proposed solutions based on lightweight symmetric authentication. These solutions scale poorly due to requiring pre-shared keys and do not provide protection against compromised service Requesters. In contrast, we consider more powerful attackers even capable of compromising legit Requesters. We propose a method that combines attacker detection and throttling, conducted by a third trusted Backend, with a lightweight authentication protocol. For attacker detection and throttling, we propose a novel approach using rate limitation algorithms. In addition, we propose and formally verify two authentication protocols suitable for different, widely used IoT network topologies. Our protocols ensure service availability for benign Requesters even if Providers are under a battery exhaustion attack. The protocols do neither require pre-shared keys between Requesters and Providers, nor the usage of asymmetric cryptography and public key infrastructures on the Provider. This makes our protocols suitable for a variety of IoT deployments involving constrained devices and constrained networks. We demonstrate the feasibility of our method through a simulation and a proof of concept implementation.
更多
查看译文
关键词
attacker detection,lightweight authentication protocol,rate limitation algorithms,authentication protocols,IoT network topologies,service availability,battery exhaustion attack,preshared keys,asymmetric cryptography,public key infrastructures,IoT deployments,constrained devices,constrained networks,RESTful IoT devices,battery exhaustion DoS attacks,IoT use cases,battery powered devices,power consumption,service Providers,remote attackers,Providers' batteries,denial of service attack,lightweight symmetric authentication,service requesters
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要