skip to main content
10.1145/3098243.3098265acmconferencesArticle/Chapter ViewAbstractPublication PageswisecConference Proceedingsconference-collections
short-paper

Power-positive networking using wireless charging: protecting energy against battery exhaustion attacks

Published: 18 July 2017 Publication History

Abstract

Energy is required for networking and computation and is a valuable resource for unplugged embedded systems. Energy DoS attack where a remote attacker exhausts the victim's battery by sending networking requests remains a critical challenge for the device availability. While prior literature proposes mitigation- and detection-based solutions, we propose to eliminate the vulnerability entirely by offloading the power requirements to the entity who makes the networking requests. To do so, we build communication channels using wireless charging signals, so that the communication and the power transfer are simultaneous and inseparable, and use the channels to build power-positive networking (PPN). PPN also offloads the computation-based costs to the requester, enabling authentication and other tasks considered too power-hungry for battery-operated devices. Furthermore, because we use the charging signal for bidirectional networking, the design requires no additional hardware beyond that for wireless charging. In this paper, we present PPN, implement a Qi-compatible prototype, and use the prototype to analyze the performance.

References

[1]
Rhett Allain. 2015. Wi-Fi Charging Works, But it Can'fit Really Power Your Phone. Wired (June 2015). http://www.wired.com/2015/06/power-wifi-isnt-think/
[2]
R. Anderson, Haowen Chan, and A. Perrig. 2004. Key infection: smart trust for smart dust. In Network Protocols, 2004. ICNP 2004. Proceedings of the 12th IEEE International Conference on. 206--215.
[3]
M. Brownfield, Yatharth Gupta, and N. Davis. 2005. Wireless sensor network denial of sleep attack. In Information Assurance Workshop, 2005. IAW '05. Proceedings from the Sixth Annual IEEE SMC. 356--364.
[4]
T. K. Buennemeyer, M. Gora, R. C. Marchany, and J. G. Tront. 2007. Battery Exhaustion Attack Detection with Small Handheld Mobile Computers. In Portable Information Devices, 2007. PORTABLE07. IEEE International Conference on. 1--5.
[5]
S.Y. Chang, S. Kumar, and Y.C. Hu. 2017. Cognitive Wireless Charger: Sensing-Based Real-Time Frequency Control For Near-Field Wireless Charging. In IEEE International Conference on Distributed Computing Systems (ICDCS) 2017.
[6]
S. Y. Chang, Y. C. Hu, and Z. Liu. 2015. Securing wireless medium access control against insider denial-of-service attackers. In Communications and Network Security (CNS), 2015 IEEE Conference on. 370--378.
[7]
W.P. Choi, W.C. Ho, X. Liu, and S.Y.R. Hui. 2010. Bidirectional communication techniques for wireless battery charging systems & portable consumer electronics. In Applied Power Electronics Conference and Exposition (APEC), 2010 Twenty-Fifth Annual IEEE. 2251--2257.
[8]
Girisha De Silva, Binbin Chen, and Mun Choon Chan. 2016. Collaborative Cellular Tail Energy Reduction: Feasibility and Fairness. In Proceedings of the 17th International Conference on Distributed Computing and Networking (ICDCN '16). ACM, New York, NY, USA, Article 25, 10 pages.
[9]
R. Falk and H. J. Hof. 2009. Fighting Insomnia: A Secure Wake-Up Scheme for Wireless Sensor Networks. In Emerging Security Information, Systems and Technologies, 2009. SECURWARE '09. Third International Conference on. 191--196.
[10]
Xiang Gao. 2013. Demodulating Communication Signals of Qi-Compliant Low-Power Wireless Charger Using MC56F8006 DSC. Technical Report. Freescale Semiconductor.
[11]
Nico Golde, Kevin Redon, and Jean-Pierre Seifert. 2013. Let Me Answer That for You: Exploiting Broadcast Information in Cellular Networks. In Presented as part of the 22nd USENIX Security Symposium (USENIX Security 13). USENIX, Washington, D.C., 33--48. https://www.usenix.org/conference/usenixsecurity13/technical-sessions/presentation/golde
[12]
D. Halperin, T. S. Heydt-Benjamin, B. Ransford, S. S. Clark, B. Defend, W. Morgan, K. Fu, T. Kohno, and W. H. Maisel. 2008. Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses. In 2008 IEEE Symposium on Security and Privacy (sp 2008). 129--142.
[13]
M. Healy, T. Newe, and E. Lewis. 2009. Security for wireless sensor networks: A review. In Sensors Applications Symposium, 2009. SAS 2009. IEEE. 80--85.
[14]
Jouya Jadidian and Dina Katabi. 2014. Magnetic MIMO: How to Charge Your Phone in Your Pocket. In Proceedings of the 20th Annual International Conference on Mobile Computing and Networking (MobiCom '14). ACM, New York, NY, USA, 495--506.
[15]
Noboru Kamijoh, Tadanobu Inoue, C. Michael Olsen, M. T. Raghunath, and Chandra Narayanaswami. 2001. Energy Trade-offs in the IBM Wristwatch Computer. In Proceedings of the 5th IEEE International Symposium on Wearable Computers (ISWC '01). IEEE Computer Society, Washington, DC, USA, 133--. http://dl.acm.org/citation.cfm?id=580581.856575
[16]
M. Kaur and S. Singh. 2015. A Study on Networking Techniques of WBAN System. In International Research Journal of Engineering and Technology (IRJET). 80--85.
[17]
Bryce Kellogg, Vamsi Talla, Shyamnath Gollakota, and Joshua R. Smith. 2016. Passive Wi-Fi: Bringing Low Power to Wi-Fi Transmissions. In 13th USENIX Symposium on Networked Systems Design and Implementation (NSDI 16). USENIX Association, Santa Clara, CA, 151--164. https://www.usenix.org/conference/nsdi16/technical-sessions/presentation/kellogg
[18]
U.K. Madawala, J. Stichbury, and S. Walker. 2004. Contactless power transfer with two-way communication. In Industrial Electronics Society, 2004. IECON 2004. 30th Annual Conference of IEEE, Vol. 3. 3071--3075 Vol. 3.
[19]
Justin Manweiler and Romit Roy Choudhury. 2011. Avoiding the Rush Hours: WiFi Energy Management via Traffic Isolation. In Proceedings of the 9th International Conference on Mobile Systems, Applications, and Services (MobiSys '11). ACM, New York, NY, USA, 253--266.
[20]
Thomas Martin, Michael Hsiao, Dong Ha, and Jayan Krishnaswami. 2004. Denial-of-Service Attacks on Battery-powered Mobile Computers. In Proceedings of the Second IEEE International Conference on Pervasive Computing and Communications (PerCom'04) (PERCOM '04). IEEE Computer Society, Washington, DC, USA, 309--. http://dl.acm.org/citation.cfm?id=977406.978701
[21]
Alessio Merlo, Mauro Migliardi, and Luca Caviglione. 2015. A survey on energy-aware security mechanisms. Pervasive and Mobile Computing 24 (2015), 77 -- 90. Special Issue on Secure Ubiquitous Computing.
[22]
John Perzow. 2015. Measuring Wireless Charging Efficiency in the Real World. WPC Trade Conference (November 2015). https://www.wirelesspowerconsortium.com/data/downloadables/1/5/2/7/john-perzow-efficiency-of-wireless-charging.pdf
[23]
D. Raymond, R. Marchany, M. Brownfield, and S. Midkiff. 2006. Effects of Denial of Sleep Attacks on Wireless Sensor Network MAC Protocols. In Information Assurance Workshop, 2006 IEEE. 297--304.
[24]
S. Slijepcevic, M. Potkonjak, V. Tsiatsis, S. Zimbeck, and M. B. Srivastava. 2002. On communication security in wireless ad-hoc sensor networks. In Enabling Technologies: Infrastructure for Collaborative Enterprises, 2002. WET ICE 2002. Proceedings. Eleventh IEEE International Workshops on. 139--144.
[25]
Joshua R. Smith, Alanson P. Sample, Pauline S. Powledge, Sumit Roy, and Alexander Mamishev. 2006. A Wirelessly-powered Platform for Sensing and Computation. In Proceedings of the 8th International Conference on Ubiquitous Computing (UbiComp'06). Springer-Verlag, Berlin, Heidelberg, 495--506.
[26]
Frank Stajano and Ross J. Anderson. 2000. The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks. In Proceedings of the 7th International Workshop on Security Protocols. Springer-Verlag, London, UK, UK, 172--194. http://dl.acm.org/citation.cfm?id=647217.760118
[27]
N. Tesla. 1914. Apparatus for transmitting electrical energy. (Dec. 1 1914). http://www.google.com/patents/US1119732 US Patent 1,119,732.
[28]
D. van Wageningen and T. Staring. 2010. The Qi wireless power standard. In Power Electronics and Motion Control Conference (EPE/PEMC), 2010 14th International. S15--25--S15--32.
[29]
R. Vyas, H. Nishimoto, M. Tentzeris, Y. Kawahara, and T. Asami. 2012. A batteryless, energy harvesting device for long range scavenging of wireless power from terrestrial TV broadcasts. In Microwave Symposium Digest (MTT), 2012 IEEE MTT-S International. 1--3.
[30]
B.H. Waters, B.J. Mahoney, V. Ranganathan, and J.R. Smith. 2015. Power Delivery and Leakage Field Control Using an Adaptive Phased Array Wireless Power System. Power Electronics, IEEE Transactions on 30, 11 (Nov 2015), 6298--6309.
[31]
Wireless Power Consortium. 2013. Qi System Description, version 1.1.2. Technical Report.
[32]
WiTricity. 2012. Highly resonant wireless power transfer: safe, efficient, and over distance. Technical Report.
[33]
X. Zhang and K. G. Shin. 2012. E-MiLi: Energy-Minimizing Idle Listening in Wireless Networks. IEEE Transactions on Mobile Computing 11, 9 (Sept 2012), 1441--1454.

Cited By

View all
  • (2023)Securing UAV Flying Base Station for Mobile Networking: A ReviewFuture Internet10.3390/fi1505017615:5(176)Online publication date: 9-May-2023
  • (2023)Towards Securing UAV Flying Base Station: Misplacement Impact Analyses on Battery and PowerProceedings of the 2023 on Systems and Network Telemetry and Analytics10.1145/3589012.3594894(3-8)Online publication date: 28-Jul-2023
  • (2022)Post-Quantum Cipher Power Analysis in Lightweight DevicesProceedings of the 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks10.1145/3507657.3529652(282-284)Online publication date: 16-May-2022
  • Show More Cited By
  1. Power-positive networking using wireless charging: protecting energy against battery exhaustion attacks

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      WiSec '17: Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks
      July 2017
      297 pages
      ISBN:9781450350846
      DOI:10.1145/3098243
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 18 July 2017

      Permissions

      Request permissions for this article.

      Check for updates

      Qualifiers

      • Short-paper

      Funding Sources

      • Agency for Science, Technology and Research (A*STAR)

      Conference

      WiSec '17
      Sponsor:

      Acceptance Rates

      Overall Acceptance Rate 98 of 338 submissions, 29%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)8
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 13 Feb 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2023)Securing UAV Flying Base Station for Mobile Networking: A ReviewFuture Internet10.3390/fi1505017615:5(176)Online publication date: 9-May-2023
      • (2023)Towards Securing UAV Flying Base Station: Misplacement Impact Analyses on Battery and PowerProceedings of the 2023 on Systems and Network Telemetry and Analytics10.1145/3589012.3594894(3-8)Online publication date: 28-Jul-2023
      • (2022)Post-Quantum Cipher Power Analysis in Lightweight DevicesProceedings of the 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks10.1145/3507657.3529652(282-284)Online publication date: 16-May-2022
      • (2021)Securing Tire Pressure Monitoring System for Vehicular Privacy2021 IEEE 18th Annual Consumer Communications & Networking Conference (CCNC)10.1109/CCNC49032.2021.9369576(1-6)Online publication date: 9-Jan-2021
      • (2020)Energy Harvesting towards Self-Powered IoT DevicesEnergies10.3390/en1321552813:21(5528)Online publication date: 22-Oct-2020
      • (2020)Dynamic power control for rational cryptocurrency miningProceedings of the 3rd Workshop on Cryptocurrencies and Blockchains for Distributed Systems10.1145/3410699.3413797(47-52)Online publication date: 25-Sep-2020
      • (2020)Security in Energy Harvesting Networks: A Survey of Current Solutions and Research ChallengesIEEE Communications Surveys & Tutorials10.1109/COMST.2020.301766522:4(2658-2693)Online publication date: Dec-2021
      • (2020)Zero-Power Defense Done Right: Shielding IMDs from Battery-Depletion AttacksJournal of Signal Processing Systems10.1007/s11265-020-01530-5Online publication date: 8-Apr-2020
      • (2019)Power-Positive NetworkingACM Transactions on Sensor Networks10.1145/331768615:3(1-25)Online publication date: 17-May-2019
      • (2019)Towards realistic battery-DoS protection of implantable medical devicesProceedings of the 16th ACM International Conference on Computing Frontiers10.1145/3310273.3321555(42-49)Online publication date: 30-Apr-2019
      • Show More Cited By

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Figures

      Tables

      Media

      Share

      Share

      Share this Publication link

      Share on social media