Mobile device profiling and intrusion detection using smart batteries

TK Buennemeyer, TM Nelson… - Proceedings of the …, 2008 - ieeexplore.ieee.org
This paper introduces capabilities developed for a battery-sensing intrusion protection
system (B-SIPS) for mobile computers, which alerts when abnormal current changes are …

An efficient approach to prevent battery exhaustion attack on BLE-based mesh networks

Z Guo, IG Harris, Y Jiang, L Tsaur - … International Conference on …, 2017 - ieeexplore.ieee.org
As the need for mesh networks for Internet of Things (IoT) applications grows, research in
this field attracts more and more attention. Because IoT devices are primarily battery-driven …

Battery exhaustion attack detection with small handheld mobile computers

TK Buennemeyer, M Gora… - 2007 IEEE …, 2007 - ieeexplore.ieee.org
This paper describes a unique battery-sensing intrusion protection system (B-SIPS) for
mobile computers, which alerts on power changes detected on small wireless devices, using …

Clustered adaptive rate limiting: Defeating denial-of-sleep attacks in wireless sensor networks

DR Raymond, SF Midkiff - MILCOM 2007-IEEE military …, 2007 - ieeexplore.ieee.org
The potential for wide-spread use of wireless sensor networks (WSN) in military monitoring,
homeland security, and other areas continues to expand. There are, however, security …

IDSX: a cluster based collaborative intrusion detection algorithm for mobile ad-hoc network

R Chaki, N Chaki - 6th International Conference on Computer …, 2007 - ieeexplore.ieee.org
Ad hoc mobile networks (MANET) vary greatly depending on their application area and
environment in which they work. We have presented a brief review of the state of the art …

Protecting RESTful IoT devices from battery exhaustion DoS attacks

S Hristozov, M Huber, G Sigl - 2020 IEEE International …, 2020 - ieeexplore.ieee.org
Many IoT use cases involve constrained battery powered devices offering services in a
RESTful manner to their communication partners. Such services may involve, eg, costly …

Method of defending against battery exhaustion attack and wireless communication device and recording medium using the method

KW Kim - US Patent 8,495,229, 2013 - Google Patents
US8495229B2 - Method of defending against battery exhaustion attack and wireless
communication device and recording medium using the method - Google Patents …

Denial-of-sleep vulnerabilities and defenses in wireless sensor network mac protocols

DR Raymond - 2008 - vtechworks.lib.vt.edu
As wireless sensor platforms become less expensive and more powerful, the promise of
their wide-spread use for everything from health monitoring to military sensing continues to …

Battery polling and trace determination for bluetooth attack detection in mobile devices

TK Buennemeyer, TM Nelson, MA Gora… - 2007 IEEE SMC …, 2007 - ieeexplore.ieee.org
This paper introduces a supporting model for a unique battery-sensing intrusion protection
system (B-SIPS) for mobile computers, which alerts when power changes are detected on …

Polling the smart battery for efficiency: Lifetime optimization in battery-sensing intrusion protection systems

TK Buennemeyer, TM Nelson… - Proceedings 2007 …, 2007 - ieeexplore.ieee.org
This paper introduces a supporting model for a unique battery-sensing intrusion protection
system (B-SIPS) for mobile computers, which alerts when power changes are detected on …