With the rapid development of the Internet of Things (IoT) technology, intelligent systems are increasingly finding their way into everyday life and people’s homes. With the spread of these technologies, there is a growing concern about the security of smart home devices. Smart home devices suffer from resource-constrained problems, and these devices and sensors could be connected to unreliable and untrustworthy networks. Nevertheless, securing IoT technology is mandatory due to the relevant data handled by these devices. One of the critical tasks to be solved by the concept of a modern smart home is the problem of preventing energy attacks spread and the usage of IoT infrastructure. One of the possible approaches to abnormal behavior of IoT devices and IoT cyberattack detection is monitoring energy consumption. Moreover, building a lightweight algorithm for securing IoT devices is essential to consider the limitation of its resources. This paper presents a lightweight technique for detecting energy consumption attacks on smart home devices based on analyzing the received packets by the smart devices. The proposed algorithm considers three different protocols, TCP, UDP, and MQTT, and different device statuses, like Idle, active, and when it is under attack. Moreover, it considers the resource constraints of the smart devices for detecting abnormal behaviors and sending an alert to the administrator as soon as the attack is detected. The proposed approach effectively detects energy consumption attacks by measuring the packet reception rate of the smart devices for different protocols.

Detection of Energy Consumption Cyber Attacks on Smart Devices

Soderi S.
;
De Nicola R.
2024-01-01

Abstract

With the rapid development of the Internet of Things (IoT) technology, intelligent systems are increasingly finding their way into everyday life and people’s homes. With the spread of these technologies, there is a growing concern about the security of smart home devices. Smart home devices suffer from resource-constrained problems, and these devices and sensors could be connected to unreliable and untrustworthy networks. Nevertheless, securing IoT technology is mandatory due to the relevant data handled by these devices. One of the critical tasks to be solved by the concept of a modern smart home is the problem of preventing energy attacks spread and the usage of IoT infrastructure. One of the possible approaches to abnormal behavior of IoT devices and IoT cyberattack detection is monitoring energy consumption. Moreover, building a lightweight algorithm for securing IoT devices is essential to consider the limitation of its resources. This paper presents a lightweight technique for detecting energy consumption attacks on smart home devices based on analyzing the received packets by the smart devices. The proposed algorithm considers three different protocols, TCP, UDP, and MQTT, and different device statuses, like Idle, active, and when it is under attack. Moreover, it considers the resource constraints of the smart devices for detecting abnormal behaviors and sending an alert to the administrator as soon as the attack is detected. The proposed approach effectively detects energy consumption attacks by measuring the packet reception rate of the smart devices for different protocols.
2024
9783031500503
9783031500510
detection
energy consumption
Internet of Things (IoT)
resource constraint
security
Smart Home (SH)
File in questo prodotto:
File Dimensione Formato  
978-3-031-50051-0_12 (1).pdf

non disponibili

Tipologia: Versione Editoriale (PDF)
Licenza: Copyright dell'editore
Dimensione 1.64 MB
Formato Adobe PDF
1.64 MB Adobe PDF   Visualizza/Apri   Richiedi una copia
2404.19434v1.pdf

accesso aperto

Tipologia: Documento in Pre-print
Licenza: Creative commons
Dimensione 921.75 kB
Formato Adobe PDF
921.75 kB Adobe PDF Visualizza/Apri

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/20.500.11771/28259
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 0
social impact