Abstract
Energy is required for networking and computation and is a valuable resource for unplugged systems such as mobile, sensor, and embedded systems. Energy denial-of-service (DoS) attack where a remote attacker exhausts the victim’s battery via networking remains a critical challenge for the device availability. While prior literature proposes mitigation- and detection-based solutions, we propose to eliminate the vulnerability entirely by offloading the power requirements to the entity who makes the networking requests. To do so, we build communication channels using wireless charging signals (as opposed to the traditional radio-frequency signals), so that the communication and the power transfer are simultaneous and inseparable, and use the channels to build power-positive networking (PPN). PPN also offloads the computation-based costs to the requester, enabling authentication and other tasks considered too power-hungry for battery-operated devices. In this article, we study the energy DoS attack impacts on off-the-shelf embedded system platforms (Raspberry Pi and the ESP 8266 system-on-chip (SoC) module), present PPN, implement and build a Qi-charging-technology-compatible prototype, and use the prototype for evaluations and analyses. Our prototype, built on the hardware already available for wireless charging, effectively defends against energy DoS and supports simultaneous power and data transfer.
- Sang-Yoon Chang, Sristi Lakshmi Sravana Kumar, Bao Anh N. Tran, Sreejaya Viswanathan, Younghee Park, and Yih-Chun Hu. 2017. Power-positive networking using wireless charging: Protecting energy against battery exhaustion attacks. In Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec’17). ACM, New York, NY, 52--57. Google ScholarDigital Library
- S. Saxena, G. Sanchez, and M. Pecht. 2017. Batteries in portable electronic devices: A user’s perspective. IEEE Ind. Electron. Mag. 11, 2 (June 2017), 35--44.Google ScholarCross Ref
- Susanne Rothgang, Thorsten Baumhöfer, Hauke van Hoek, Tobias Lange, Rik W. de Doncker, and Dirk Uwe Sauer. 2014. Modular battery design for reliable, flexible and multi-technology energy storage systems. Appl. Energy 137, 1 (2014), 931--937.Google ScholarCross Ref
- T. P. J. Crompton. 2000. Battery Reference Book. Elsevier Science. https://books.google.com/books?id=QmVR7qiB5AUC.Google Scholar
- Frank Stajano and Ross J. Anderson. 2000. The resurrecting duckling: Security issues for ad-hoc wireless networks. In Proceedings of the 7th International Workshop on Security Protocols. Springer-Verlag, London, UK, 172--194. http://dl.acm.org/citation.cfm?id=647217.760118 Google ScholarDigital Library
- D. Halperin, T. S. Heydt-Benjamin, B. Ransford, S. S. Clark, B. Defend, W. Morgan, K. Fu, T. Kohno, and W. H. Maisel. 2008. Pacemakers and implantable cardiac defibrillators: Software radio attacks and zero-power defenses. In 2008 IEEE Symposium on Security and Privacy (SP’08). 129--142. Google ScholarDigital Library
- Justin Manweiler and Romit Roy Choudhury. 2011. Avoiding the rush hours: WiFi energy management via traffic isolation. In Proceedings of the 9th International Conference on Mobile Systems, Applications, and Services (MobiSys’11). ACM, New York, NY, 253--266. Google ScholarDigital Library
- X. Zhang and K. G. Shin. 2012. E-MiLi: Energy-minimizing idle listening in wireless networks. IEEE Trans. Mob. Comput. 11, 9 (Sept. 2012), 1441--1454. Google ScholarDigital Library
- Girisha De Silva, Binbin Chen, and Mun Choon Chan. 2016. Collaborative cellular tail energy reduction: Feasibility and fairness. In Proceedings of the 17th International Conference on Distributed Computing and Networking (ICDCN’16). ACM, New York, NY, Article 25, 10 pages. Google ScholarDigital Library
- S. Y. Chang and Y. C. Hu. 2017. SecureMAC: Securing wireless medium access control against insider denial-of-service attacks. IEEE Trans. Mob. Comput. 16, 12 (Dec. 2017), 3527--3540.Google ScholarCross Ref
- Nico Golde, Kevin Redon, and Jean-Pierre Seifert. 2013. Let me answer that for you: Exploiting broadcast information in cellular networks. In Proceedings of the 22nd USENIX Security Symposium (USENIX Security 13). USENIX, Washington, D.C., 33--48. https://www.usenix.org/conference/usenixsecurity13/technical-sessions/presentation/golde. Google ScholarDigital Library
- S. Y. Chang, Y. C. Hu, and Z. Liu. 2015. Securing wireless medium access control against insider denial-of-service attackers. In 2015 IEEE Conference on Communications and Network Security (CNS’15). 370--378.Google Scholar
- X. Wei, Q. Wang, T. Wang, and J. Fan. 2017. Jammer localization in multi-hop wireless network: A comprehensive survey. IEEE Commun. Surv. Tutorials 19, 2 (2017), 765--799.Google ScholarDigital Library
- Sang-Yoon Chang, Yih-Chun Hu, and Nicola Laurenti. 2012. SimpleMAC: A jamming-resilient MAC-layer protocol for wireless channel coordination. In Proceedings of the 18th Annual International Conference on Mobile Computing and Networking (Mobicom’12). ACM, New York, NY, 77--88. Google ScholarDigital Library
- Triet Dang Vo-Huu, Tien Dang Vo-Huu, and Guevara Noubir. 2016. Interleaving jamming in wi-fi networks. In Proceedings of the 9th ACM Conference on Security 8 Privacy in Wireless and Mobile Networks (WiSec’16). ACM, New York, NY, 31--42. Google ScholarDigital Library
- Subhash Lakshminarayana, Jabir Shabbir Karachiwala, Sang-Yoon Chang, Girish Revadigar, Sristi Lakshmi Sravana Kumar, David K. Y. Yau, and Yih-Chun Hu. 2018. Signal jamming attacks against communication-based train control: Attack impact and countermeasure. In Proceedings of the 11th ACM Conference on Security 8 Privacy in Wireless and Mobile Networks (WiSec’18). ACM, New York, NY, 160--171. Google ScholarDigital Library
- S. Slijepcevic, M. Potkonjak, V. Tsiatsis, S. Zimbeck, and M. B. Srivastava. 2002. On communication security in wireless ad-hoc sensor networks. In Proceedings of the 11th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE’02). 139--144. Google ScholarDigital Library
- Thomas Martin, Michael Hsiao, Dong Ha, and Jayan Krishnaswami. 2004. Denial-of-service attacks on battery-powered mobile computers. In Proceedings of the 2nd IEEE International Conference on Pervasive Computing and Communications (PERCOM’04). IEEE Computer Society, Washington, D.C., 309--318. http://dl.acm.org/citation.cfm?id=977406.978701 Google ScholarDigital Library
- R. Anderson, Haowen Chan, and A. Perrig. 2004. Key infection: Smart trust for smart dust. In Proceedings of the 12th IEEE International Conference on Network Protocols (ICNP’04). 206--215. Google ScholarDigital Library
- T. K. Buennemeyer, M. Gora, R. C. Marchany, and J. G. Tront. 2007. Battery exhaustion attack detection with small handheld mobile computers. In IEEE International Conference on Portable Information Devices (PORTABLE’07). 1--5.Google Scholar
- Alessio Merlo, Mauro Migliardi, and Luca Caviglione. 2015. A survey on energy-aware security mechanisms. Pervasive Mob. Comput. 24 (2015), 77--90. Special Issue on Secure Ubiquitous Computing. Google ScholarDigital Library
- Hahnsang Kim, Joshua Smith, and Kang G. Shin. 2008. Detecting energy-greedy anomalies and mobile malware variants. In Proceedings of the 6th International Conference on Mobile Systems, Applications, and Services (MobiSys’08). ACM, New York, NY, 239--252. Google ScholarDigital Library
- Xiao Ma, Peng Huang, Xinxin Jin, Pei Wang, Soyeon Park, Dongcai Shen, Yuanyuan Zhou, Lawrence K. Saul, and Geoffrey M. Voelker. 2013. eDoctor: Automatically diagnosing abnormal battery drain issues on smartphones. In Proceedings of the 10th USENIX Symposium on Networked Systems Design and Implementation (NSDI’13). USENIX, Lombard, IL, 57--70. https://www.usenix.org/conference/nsdi13/technical-sessions/presentation/ma. Google ScholarDigital Library
- Peng Huang, Tianyin Xu, Xinxin Jin, and Yuanyuan Zhou. 2016. DefDroid: Towards a more defensive mobile os against disruptive app behavior. In Proceedings of the 14th Annual International Conference on Mobile Systems, Applications, and Services (MobiSys’16). ACM, New York, NY, 221--234. Google ScholarDigital Library
- X. Gao, D. Liu, D. Liu, H. Wang, and A. Stavrou. 2017. E-Android: A new energy profiling tool for smartphones. In 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS’17). 492--502.Google Scholar
- R. Falk and H. J. Hof. 2009. Fighting insomnia: A secure wake-up scheme for wireless sensor networks. In 3rd International Conference on Emerging Security Information, Systems, and Technologies (SECURWARE’09). 191--196. Google ScholarDigital Library
- M. Brownfield, Yatharth Gupta, and N. Davis. 2005. Wireless sensor network denial of sleep attack. In Proceedings of the 6th Annual IEEE SMC Information Assurance Workshop (IAW’05). 356--364.Google Scholar
- D. Raymond, R. Marchany, M. Brownfield, and S. Midkiff. 2006. Effects of denial of sleep attacks on wireless sensor network MAC protocols. In 2006 IEEE Information Assurance Workshop. 297--304.Google Scholar
- M. Keskilammi, L. Sydänheimo, and M. Kivikoski. 2003. Radio frequency technology for automated manufacturing and logistics control. part 1: Passive RFID systems and the effects of antenna parameters on operational distance. Int. J. Adv. Manuf. Technol. 21, 10 (2003), 769--774.Google ScholarCross Ref
- C. Zhou and J. D. Griffin. 2012. Accurate phase-based ranging measurements for backscatter RFID tags. IEEE Antennas Wirel. Propag. Lett. 11 (2012), 152--155.Google ScholarCross Ref
- Qi Chai and Guang Gong. 2012. BUPLE: Securing passive RFID communication through physical layer enhancements. In RFID. Security and Privacy, Ari Juels and Christof Paar (Eds.). Springer, Berlin, Germany, 127--146. Google ScholarDigital Library
- U. K. Madawala, J. Stichbury, and S. Walker. 2004. Contactless power transfer with two-way communication. In 30th Annual Conference of IEEE Industrial Electronics Society (IECON’04), Vol. 3. 3071--3075.Google Scholar
- W. P. Choi, W. C. Ho, X. Liu, and S. Y. R. Hui. 2010. Bidirectional communication techniques for wireless battery charging systems 8 portable consumer electronics. In 2010 25th Annual IEEE Applied Power Electronics Conference and Exposition (APEC). 2251--2257.Google ScholarCross Ref
- J. Wu, C. Zhao, Z. Lin, J. Du, Y. Hu, and X. He. 2015. Wireless power and data transfer via a common inductive link using frequency division multiplexing. IEEE Trans. Ind. Electron. 62, 12 (2015), 7810--7820.Google ScholarCross Ref
- D. van Wageningen and T. Staring. 2010. The Qi wireless power standard. In 2010 14th International Power Electronics and Motion Control Conference (EPE/PEMC). S15--25--S15--32.Google Scholar
- Wireless Power Consortium. 2013. Qi System Description, version 1.1.2. Technical Report.Google Scholar
- Xiang Gao. 2013. Demodulating Communication Signals of Qi-Compliant Low-Power Wireless Charger Using MC56F8006 DSC. Technical Report. Freescale Semiconductor.Google Scholar
- Jouya Jadidian and Dina Katabi. 2014. Magnetic MIMO: How to charge your phone in your pocket. In Proceedings of the 20th Annual International Conference on Mobile Computing and Networking (MobiCom’14). ACM, New York, NY, 495--506. Google ScholarDigital Library
- Lixin Shi, Zachary Kabelac, Dina Katabi, and David Perreault. 2015. Wireless power hotspot that charges all of your devices. In Proceedings of the 21st Annual International Conference on Mobile Computing and Networking (MobiCom’15). ACM, New York, NY, 2--13. Google ScholarDigital Library
- B. H. Waters, B. J. Mahoney, V. Ranganathan, and J. R. Smith. 2015. Power delivery and leakage field control using an adaptive phased array wireless power system. IEEE Trans. Power Electron. 30, 11 (Nov. 2015), 6298--6309.Google ScholarCross Ref
- Andre Kurs, Aristeidis Karalis, Robert Moffatt, J. D. Joannopoulos, Peter Fisher, and Marin Soljacic. 2007. Wireless power transfer via strongly coupled magnetic resonances. Sci. 317, 5834 (July 2007), 83--86.Google ScholarCross Ref
- S. Y. Chang, S. Kumar, and Y. C. Hu. 2017. Cognitive wireless charger: Sensing-based real-time frequency control for near-field wireless charging. In IEEE International Conference on Distributed Computing Systems (ICDCS’17). 2302--2307.Google Scholar
- Benjamin H. Waters, Alanson P. Sample, and Joshua R. Smith. 2012. Adaptive impedance matching for magnetically coupled resonators. In Progress in Electromagnetics Research Symposium. 694--701.Google Scholar
- S. O’Driscoll, A. S. Y. Poon, and T. H. Meng. 2009. A mm-sized implantable power receiver with adaptive link compensation. In IEEE International Solid-State Circuits Conference—Digest of Technical Papers. 294--295.Google Scholar
- D. W. Baarman, S. J. McPhilliamy, and C. Houghton. 2006. Inductively powered apparatus. Retrieved from https://www.google.com/patents/US7118240. US Patent 7,118,240.Google Scholar
- K. W. Lee, Y. S. Kim, K. H. Byun, and S. K. YEO. 2015. Method for controlling charging power and wireless charging apparatus for the same. Retrieved from https://www.google.com/patents/US9048683. US Patent 9,048,683.Google Scholar
- Vamsi Talla, Bryce Kellogg, Benjamin Ransford, Saman Naderiparizi, Shyamnath Gollakota, and Joshua R. Smith. 2015. Powering the next billion devices with Wi-Fi. Arxiv Preprint Arxiv:1505.06815 (2015).Google Scholar
- R. Vyas, H. Nishimoto, M. Tentzeris, Y. Kawahara, and T. Asami. 2012. A battery-less, energy harvesting device for long range scavenging of wireless power from terrestrial TV broadcasts. In 2012 IEEE MTT-S International Microwave Symposium Digest (MTT). 1--3.Google Scholar
- Joshua R. Smith, Alanson P. Sample, Pauline S. Powledge, Sumit Roy, and Alexander Mamishev. 2006. A wirelessly-powered platform for sensing and computation. In Proceedings of the 8th International Conference on Ubiquitous Computing (UbiComp’06). Springer-Verlag, Berlin, Germany, 495--506. Google ScholarDigital Library
- Hee-Jin Chae, Mastooreh Salajegheh, Daniel J. Yeager, Joshua R. Smith, and Kevin Fu. 2013. Maximalist Cryptography and Computation on the WISP UHF RFID Tag. Springer, New York, NY, 175--187.Google Scholar
- John Perzow. 2015. Measuring wireless charging efficiency in the real world. WPC Trade Conference (November 2015). Retrieved from https://www.wirelesspowerconsortium.com/data/downloadables/1/5/2/7/john-perzow-efficiency-of-wireless-charging.pdf.Google Scholar
- Rhett Allain. 2015. Wi-Fi charging works, but it can’t really power your phone. Wired (June 2015). Retrieved from http://www.wired.com/2015/06/power-wifi-isnt-think/.Google Scholar
- J. Nadakuduti, Lin Lu, and P. Guckian. 2013. Operating frequency selection for loosely coupled wireless power transfer systems with respect to RF emissions and RF exposure requirements. In Wireless Power Transfer (WPT), 2013 IEEE. 234--237.Google Scholar
- WiTricity. 2012. Highly Resonant Wireless Power Transfer: Safe, Efficient, and Over Distance. Technical Report.Google Scholar
- M. Healy, T. Newe, and E. Lewis. 2009. Security for wireless sensor networks: A review. In IEEE Sensors Applications Symposium (SAS’09). 80--85.Google Scholar
- M. Kaur and S. Singh. 2015. A study on networking techniques of WBAN system. Int. Res. Eng. Technol. (IRJET) 2, 9 (2015), 80--85.Google Scholar
- Bryce Kellogg, Vamsi Talla, Shyamnath Gollakota, and Joshua R. Smith. 2016. Passive Wi-Fi: Bringing low power to wi-fi transmissions. In 13th USENIX Symposium on Networked Systems Design and Implementation (NSDI’16). USENIX Association, Santa Clara, CA, 151--164. https://www.usenix.org/conference/nsdi16/technical-sessions/presentation/kellogg. Google ScholarDigital Library
- Noboru Kamijoh, Tadanobu Inoue, C. Michael Olsen, M. T. Raghunath, and Chandra Narayanaswami. 2001. Energy trade-offs in the IBM wristwatch computer. In Proceedings of the 5th IEEE International Symposium on Wearable Computers (ISWC’01). IEEE Computer Society, Washington, D.C., 133--. http://dl.acm.org/citation.cfm?id=580581.856575 Google ScholarDigital Library
- N. Tesla. 1914. Apparatus for transmitting electrical energy. Retrieved from http://www.google.com/patents/US1119732. US Patent 1,119,732.Google Scholar
Index Terms
- Power-Positive Networking: Wireless-Charging-Based Networking to Protect Energy against Battery DoS Attacks
Recommendations
Wireless Charging Power Side-Channel Attacks
CCS '21: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications SecurityThis paper demonstrates that today's wireless charging interface is vulnerable to power side-channel attacks; a smartphone that charges wirelessly leaks information about its activity to the wireless charger transmitter. We present a website ...
Denial-of-Sleep-Resilient Session Key Establishment for IEEE 802.15.4 Security: From Adaptive to Responsive
EWSN ’18: Proceedings of the 2018 International Conference on Embedded Wireless Systems and NetworksBattery-powered and energy-harvesting IEEE 802.15.4 nodes are subject to so-called denial-of-sleep attacks. Such attacks generally aim at draining the energy of a victim device. Especially, session key establishment schemes for IEEE 802.15.4 security ...
SWARD: A Secure WAke-up RaDio against Denial-of-Service on IoT devices
WiSec '18: Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile NetworksWake-up radios are mechanisms that control the sleep and active modes of energy-constrained Internet of Things (IoT) nodes. These radios detect pre-determined wake-up tokens and switch the devices to an active state. Such systems are vulnerable to a ...
Comments