skip to main content
research-article

Power-Positive Networking: Wireless-Charging-Based Networking to Protect Energy against Battery DoS Attacks

Published:17 May 2019Publication History
Skip Abstract Section

Abstract

Energy is required for networking and computation and is a valuable resource for unplugged systems such as mobile, sensor, and embedded systems. Energy denial-of-service (DoS) attack where a remote attacker exhausts the victim’s battery via networking remains a critical challenge for the device availability. While prior literature proposes mitigation- and detection-based solutions, we propose to eliminate the vulnerability entirely by offloading the power requirements to the entity who makes the networking requests. To do so, we build communication channels using wireless charging signals (as opposed to the traditional radio-frequency signals), so that the communication and the power transfer are simultaneous and inseparable, and use the channels to build power-positive networking (PPN). PPN also offloads the computation-based costs to the requester, enabling authentication and other tasks considered too power-hungry for battery-operated devices. In this article, we study the energy DoS attack impacts on off-the-shelf embedded system platforms (Raspberry Pi and the ESP 8266 system-on-chip (SoC) module), present PPN, implement and build a Qi-charging-technology-compatible prototype, and use the prototype for evaluations and analyses. Our prototype, built on the hardware already available for wireless charging, effectively defends against energy DoS and supports simultaneous power and data transfer.

References

  1. Sang-Yoon Chang, Sristi Lakshmi Sravana Kumar, Bao Anh N. Tran, Sreejaya Viswanathan, Younghee Park, and Yih-Chun Hu. 2017. Power-positive networking using wireless charging: Protecting energy against battery exhaustion attacks. In Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec’17). ACM, New York, NY, 52--57. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. S. Saxena, G. Sanchez, and M. Pecht. 2017. Batteries in portable electronic devices: A user’s perspective. IEEE Ind. Electron. Mag. 11, 2 (June 2017), 35--44.Google ScholarGoogle ScholarCross RefCross Ref
  3. Susanne Rothgang, Thorsten Baumhöfer, Hauke van Hoek, Tobias Lange, Rik W. de Doncker, and Dirk Uwe Sauer. 2014. Modular battery design for reliable, flexible and multi-technology energy storage systems. Appl. Energy 137, 1 (2014), 931--937.Google ScholarGoogle ScholarCross RefCross Ref
  4. T. P. J. Crompton. 2000. Battery Reference Book. Elsevier Science. https://books.google.com/books?id=QmVR7qiB5AUC.Google ScholarGoogle Scholar
  5. Frank Stajano and Ross J. Anderson. 2000. The resurrecting duckling: Security issues for ad-hoc wireless networks. In Proceedings of the 7th International Workshop on Security Protocols. Springer-Verlag, London, UK, 172--194. http://dl.acm.org/citation.cfm?id=647217.760118 Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. D. Halperin, T. S. Heydt-Benjamin, B. Ransford, S. S. Clark, B. Defend, W. Morgan, K. Fu, T. Kohno, and W. H. Maisel. 2008. Pacemakers and implantable cardiac defibrillators: Software radio attacks and zero-power defenses. In 2008 IEEE Symposium on Security and Privacy (SP’08). 129--142. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Justin Manweiler and Romit Roy Choudhury. 2011. Avoiding the rush hours: WiFi energy management via traffic isolation. In Proceedings of the 9th International Conference on Mobile Systems, Applications, and Services (MobiSys’11). ACM, New York, NY, 253--266. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. X. Zhang and K. G. Shin. 2012. E-MiLi: Energy-minimizing idle listening in wireless networks. IEEE Trans. Mob. Comput. 11, 9 (Sept. 2012), 1441--1454. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Girisha De Silva, Binbin Chen, and Mun Choon Chan. 2016. Collaborative cellular tail energy reduction: Feasibility and fairness. In Proceedings of the 17th International Conference on Distributed Computing and Networking (ICDCN’16). ACM, New York, NY, Article 25, 10 pages. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. S. Y. Chang and Y. C. Hu. 2017. SecureMAC: Securing wireless medium access control against insider denial-of-service attacks. IEEE Trans. Mob. Comput. 16, 12 (Dec. 2017), 3527--3540.Google ScholarGoogle ScholarCross RefCross Ref
  11. Nico Golde, Kevin Redon, and Jean-Pierre Seifert. 2013. Let me answer that for you: Exploiting broadcast information in cellular networks. In Proceedings of the 22nd USENIX Security Symposium (USENIX Security 13). USENIX, Washington, D.C., 33--48. https://www.usenix.org/conference/usenixsecurity13/technical-sessions/presentation/golde. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. S. Y. Chang, Y. C. Hu, and Z. Liu. 2015. Securing wireless medium access control against insider denial-of-service attackers. In 2015 IEEE Conference on Communications and Network Security (CNS’15). 370--378.Google ScholarGoogle Scholar
  13. X. Wei, Q. Wang, T. Wang, and J. Fan. 2017. Jammer localization in multi-hop wireless network: A comprehensive survey. IEEE Commun. Surv. Tutorials 19, 2 (2017), 765--799.Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Sang-Yoon Chang, Yih-Chun Hu, and Nicola Laurenti. 2012. SimpleMAC: A jamming-resilient MAC-layer protocol for wireless channel coordination. In Proceedings of the 18th Annual International Conference on Mobile Computing and Networking (Mobicom’12). ACM, New York, NY, 77--88. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Triet Dang Vo-Huu, Tien Dang Vo-Huu, and Guevara Noubir. 2016. Interleaving jamming in wi-fi networks. In Proceedings of the 9th ACM Conference on Security 8 Privacy in Wireless and Mobile Networks (WiSec’16). ACM, New York, NY, 31--42. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Subhash Lakshminarayana, Jabir Shabbir Karachiwala, Sang-Yoon Chang, Girish Revadigar, Sristi Lakshmi Sravana Kumar, David K. Y. Yau, and Yih-Chun Hu. 2018. Signal jamming attacks against communication-based train control: Attack impact and countermeasure. In Proceedings of the 11th ACM Conference on Security 8 Privacy in Wireless and Mobile Networks (WiSec’18). ACM, New York, NY, 160--171. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. S. Slijepcevic, M. Potkonjak, V. Tsiatsis, S. Zimbeck, and M. B. Srivastava. 2002. On communication security in wireless ad-hoc sensor networks. In Proceedings of the 11th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE’02). 139--144. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Thomas Martin, Michael Hsiao, Dong Ha, and Jayan Krishnaswami. 2004. Denial-of-service attacks on battery-powered mobile computers. In Proceedings of the 2nd IEEE International Conference on Pervasive Computing and Communications (PERCOM’04). IEEE Computer Society, Washington, D.C., 309--318. http://dl.acm.org/citation.cfm?id=977406.978701 Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. R. Anderson, Haowen Chan, and A. Perrig. 2004. Key infection: Smart trust for smart dust. In Proceedings of the 12th IEEE International Conference on Network Protocols (ICNP’04). 206--215. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. T. K. Buennemeyer, M. Gora, R. C. Marchany, and J. G. Tront. 2007. Battery exhaustion attack detection with small handheld mobile computers. In IEEE International Conference on Portable Information Devices (PORTABLE’07). 1--5.Google ScholarGoogle Scholar
  21. Alessio Merlo, Mauro Migliardi, and Luca Caviglione. 2015. A survey on energy-aware security mechanisms. Pervasive Mob. Comput. 24 (2015), 77--90. Special Issue on Secure Ubiquitous Computing. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Hahnsang Kim, Joshua Smith, and Kang G. Shin. 2008. Detecting energy-greedy anomalies and mobile malware variants. In Proceedings of the 6th International Conference on Mobile Systems, Applications, and Services (MobiSys’08). ACM, New York, NY, 239--252. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Xiao Ma, Peng Huang, Xinxin Jin, Pei Wang, Soyeon Park, Dongcai Shen, Yuanyuan Zhou, Lawrence K. Saul, and Geoffrey M. Voelker. 2013. eDoctor: Automatically diagnosing abnormal battery drain issues on smartphones. In Proceedings of the 10th USENIX Symposium on Networked Systems Design and Implementation (NSDI’13). USENIX, Lombard, IL, 57--70. https://www.usenix.org/conference/nsdi13/technical-sessions/presentation/ma. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Peng Huang, Tianyin Xu, Xinxin Jin, and Yuanyuan Zhou. 2016. DefDroid: Towards a more defensive mobile os against disruptive app behavior. In Proceedings of the 14th Annual International Conference on Mobile Systems, Applications, and Services (MobiSys’16). ACM, New York, NY, 221--234. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. X. Gao, D. Liu, D. Liu, H. Wang, and A. Stavrou. 2017. E-Android: A new energy profiling tool for smartphones. In 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS’17). 492--502.Google ScholarGoogle Scholar
  26. R. Falk and H. J. Hof. 2009. Fighting insomnia: A secure wake-up scheme for wireless sensor networks. In 3rd International Conference on Emerging Security Information, Systems, and Technologies (SECURWARE’09). 191--196. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. M. Brownfield, Yatharth Gupta, and N. Davis. 2005. Wireless sensor network denial of sleep attack. In Proceedings of the 6th Annual IEEE SMC Information Assurance Workshop (IAW’05). 356--364.Google ScholarGoogle Scholar
  28. D. Raymond, R. Marchany, M. Brownfield, and S. Midkiff. 2006. Effects of denial of sleep attacks on wireless sensor network MAC protocols. In 2006 IEEE Information Assurance Workshop. 297--304.Google ScholarGoogle Scholar
  29. M. Keskilammi, L. Sydänheimo, and M. Kivikoski. 2003. Radio frequency technology for automated manufacturing and logistics control. part 1: Passive RFID systems and the effects of antenna parameters on operational distance. Int. J. Adv. Manuf. Technol. 21, 10 (2003), 769--774.Google ScholarGoogle ScholarCross RefCross Ref
  30. C. Zhou and J. D. Griffin. 2012. Accurate phase-based ranging measurements for backscatter RFID tags. IEEE Antennas Wirel. Propag. Lett. 11 (2012), 152--155.Google ScholarGoogle ScholarCross RefCross Ref
  31. Qi Chai and Guang Gong. 2012. BUPLE: Securing passive RFID communication through physical layer enhancements. In RFID. Security and Privacy, Ari Juels and Christof Paar (Eds.). Springer, Berlin, Germany, 127--146. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. U. K. Madawala, J. Stichbury, and S. Walker. 2004. Contactless power transfer with two-way communication. In 30th Annual Conference of IEEE Industrial Electronics Society (IECON’04), Vol. 3. 3071--3075.Google ScholarGoogle Scholar
  33. W. P. Choi, W. C. Ho, X. Liu, and S. Y. R. Hui. 2010. Bidirectional communication techniques for wireless battery charging systems 8 portable consumer electronics. In 2010 25th Annual IEEE Applied Power Electronics Conference and Exposition (APEC). 2251--2257.Google ScholarGoogle ScholarCross RefCross Ref
  34. J. Wu, C. Zhao, Z. Lin, J. Du, Y. Hu, and X. He. 2015. Wireless power and data transfer via a common inductive link using frequency division multiplexing. IEEE Trans. Ind. Electron. 62, 12 (2015), 7810--7820.Google ScholarGoogle ScholarCross RefCross Ref
  35. D. van Wageningen and T. Staring. 2010. The Qi wireless power standard. In 2010 14th International Power Electronics and Motion Control Conference (EPE/PEMC). S15--25--S15--32.Google ScholarGoogle Scholar
  36. Wireless Power Consortium. 2013. Qi System Description, version 1.1.2. Technical Report.Google ScholarGoogle Scholar
  37. Xiang Gao. 2013. Demodulating Communication Signals of Qi-Compliant Low-Power Wireless Charger Using MC56F8006 DSC. Technical Report. Freescale Semiconductor.Google ScholarGoogle Scholar
  38. Jouya Jadidian and Dina Katabi. 2014. Magnetic MIMO: How to charge your phone in your pocket. In Proceedings of the 20th Annual International Conference on Mobile Computing and Networking (MobiCom’14). ACM, New York, NY, 495--506. Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. Lixin Shi, Zachary Kabelac, Dina Katabi, and David Perreault. 2015. Wireless power hotspot that charges all of your devices. In Proceedings of the 21st Annual International Conference on Mobile Computing and Networking (MobiCom’15). ACM, New York, NY, 2--13. Google ScholarGoogle ScholarDigital LibraryDigital Library
  40. B. H. Waters, B. J. Mahoney, V. Ranganathan, and J. R. Smith. 2015. Power delivery and leakage field control using an adaptive phased array wireless power system. IEEE Trans. Power Electron. 30, 11 (Nov. 2015), 6298--6309.Google ScholarGoogle ScholarCross RefCross Ref
  41. Andre Kurs, Aristeidis Karalis, Robert Moffatt, J. D. Joannopoulos, Peter Fisher, and Marin Soljacic. 2007. Wireless power transfer via strongly coupled magnetic resonances. Sci. 317, 5834 (July 2007), 83--86.Google ScholarGoogle ScholarCross RefCross Ref
  42. S. Y. Chang, S. Kumar, and Y. C. Hu. 2017. Cognitive wireless charger: Sensing-based real-time frequency control for near-field wireless charging. In IEEE International Conference on Distributed Computing Systems (ICDCS’17). 2302--2307.Google ScholarGoogle Scholar
  43. Benjamin H. Waters, Alanson P. Sample, and Joshua R. Smith. 2012. Adaptive impedance matching for magnetically coupled resonators. In Progress in Electromagnetics Research Symposium. 694--701.Google ScholarGoogle Scholar
  44. S. O’Driscoll, A. S. Y. Poon, and T. H. Meng. 2009. A mm-sized implantable power receiver with adaptive link compensation. In IEEE International Solid-State Circuits Conference—Digest of Technical Papers. 294--295.Google ScholarGoogle Scholar
  45. D. W. Baarman, S. J. McPhilliamy, and C. Houghton. 2006. Inductively powered apparatus. Retrieved from https://www.google.com/patents/US7118240. US Patent 7,118,240.Google ScholarGoogle Scholar
  46. K. W. Lee, Y. S. Kim, K. H. Byun, and S. K. YEO. 2015. Method for controlling charging power and wireless charging apparatus for the same. Retrieved from https://www.google.com/patents/US9048683. US Patent 9,048,683.Google ScholarGoogle Scholar
  47. Vamsi Talla, Bryce Kellogg, Benjamin Ransford, Saman Naderiparizi, Shyamnath Gollakota, and Joshua R. Smith. 2015. Powering the next billion devices with Wi-Fi. Arxiv Preprint Arxiv:1505.06815 (2015).Google ScholarGoogle Scholar
  48. R. Vyas, H. Nishimoto, M. Tentzeris, Y. Kawahara, and T. Asami. 2012. A battery-less, energy harvesting device for long range scavenging of wireless power from terrestrial TV broadcasts. In 2012 IEEE MTT-S International Microwave Symposium Digest (MTT). 1--3.Google ScholarGoogle Scholar
  49. Joshua R. Smith, Alanson P. Sample, Pauline S. Powledge, Sumit Roy, and Alexander Mamishev. 2006. A wirelessly-powered platform for sensing and computation. In Proceedings of the 8th International Conference on Ubiquitous Computing (UbiComp’06). Springer-Verlag, Berlin, Germany, 495--506. Google ScholarGoogle ScholarDigital LibraryDigital Library
  50. Hee-Jin Chae, Mastooreh Salajegheh, Daniel J. Yeager, Joshua R. Smith, and Kevin Fu. 2013. Maximalist Cryptography and Computation on the WISP UHF RFID Tag. Springer, New York, NY, 175--187.Google ScholarGoogle Scholar
  51. John Perzow. 2015. Measuring wireless charging efficiency in the real world. WPC Trade Conference (November 2015). Retrieved from https://www.wirelesspowerconsortium.com/data/downloadables/1/5/2/7/john-perzow-efficiency-of-wireless-charging.pdf.Google ScholarGoogle Scholar
  52. Rhett Allain. 2015. Wi-Fi charging works, but it can’t really power your phone. Wired (June 2015). Retrieved from http://www.wired.com/2015/06/power-wifi-isnt-think/.Google ScholarGoogle Scholar
  53. J. Nadakuduti, Lin Lu, and P. Guckian. 2013. Operating frequency selection for loosely coupled wireless power transfer systems with respect to RF emissions and RF exposure requirements. In Wireless Power Transfer (WPT), 2013 IEEE. 234--237.Google ScholarGoogle Scholar
  54. WiTricity. 2012. Highly Resonant Wireless Power Transfer: Safe, Efficient, and Over Distance. Technical Report.Google ScholarGoogle Scholar
  55. M. Healy, T. Newe, and E. Lewis. 2009. Security for wireless sensor networks: A review. In IEEE Sensors Applications Symposium (SAS’09). 80--85.Google ScholarGoogle Scholar
  56. M. Kaur and S. Singh. 2015. A study on networking techniques of WBAN system. Int. Res. Eng. Technol. (IRJET) 2, 9 (2015), 80--85.Google ScholarGoogle Scholar
  57. Bryce Kellogg, Vamsi Talla, Shyamnath Gollakota, and Joshua R. Smith. 2016. Passive Wi-Fi: Bringing low power to wi-fi transmissions. In 13th USENIX Symposium on Networked Systems Design and Implementation (NSDI’16). USENIX Association, Santa Clara, CA, 151--164. https://www.usenix.org/conference/nsdi16/technical-sessions/presentation/kellogg. Google ScholarGoogle ScholarDigital LibraryDigital Library
  58. Noboru Kamijoh, Tadanobu Inoue, C. Michael Olsen, M. T. Raghunath, and Chandra Narayanaswami. 2001. Energy trade-offs in the IBM wristwatch computer. In Proceedings of the 5th IEEE International Symposium on Wearable Computers (ISWC’01). IEEE Computer Society, Washington, D.C., 133--. http://dl.acm.org/citation.cfm?id=580581.856575 Google ScholarGoogle ScholarDigital LibraryDigital Library
  59. N. Tesla. 1914. Apparatus for transmitting electrical energy. Retrieved from http://www.google.com/patents/US1119732. US Patent 1,119,732.Google ScholarGoogle Scholar

Index Terms

  1. Power-Positive Networking: Wireless-Charging-Based Networking to Protect Energy against Battery DoS Attacks

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in

    Full Access

    • Published in

      cover image ACM Transactions on Sensor Networks
      ACM Transactions on Sensor Networks  Volume 15, Issue 3
      August 2019
      324 pages
      ISSN:1550-4859
      EISSN:1550-4867
      DOI:10.1145/3335317
      Issue’s Table of Contents

      Copyright © 2019 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 17 May 2019
      • Revised: 1 February 2019
      • Accepted: 1 February 2019
      • Received: 1 July 2018
      Published in tosn Volume 15, Issue 3

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format .

    View HTML Format