Identification and Simulation of a Denial-of-Sleep Attack on Open Metering System

We identify a vulnerability of the Open Metering System (OMS) protocol that can be used to run a Denial-of-Sleep attack against it, which is a special type of Denial-of-Service attack on battery-driven devices. In order to analyze the impact of both the normal usage and the attack, we first provide a simulation model that covers the typical characteristics of a battery usage. Then we describe the necessary attacker model. The vulnerability is caused by the fact that an interactive key exchange is used which can be mistreated to keep the device away from sleep mode. Finally, we discuss the impact of the attack and a robust solution.

[1]  Scott F. Midkiff,et al.  Effects of Denial-of-Sleep Attacks on Wireless Sensor Network MAC Protocols , 2009, IEEE Transactions on Vehicular Technology.

[2]  Vladimir Getov,et al.  Performance Analysis of Denial-of-Sleep Attack-Prone MAC Protocols in Wireless Sensor Networks , 2018, 2018 UKSim-AMSS 20th International Conference on Computer Modelling and Simulation (UKSim).

[3]  V. C. Manju,et al.  Mechanisms for detecting and preventing denial of sleep attacks on wireless sensor networks , 2013, 2013 IEEE CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGIES.

[4]  Arindam Ghosh,et al.  Analysis of Denial-of-Service attacks on Wireless Sensor Networks using simulation , 2011 .

[5]  Li Hui,et al.  An Effective Scheme for Defending Denial-of-Sleep Attack in Wireless Sensor Networks , 2009, 2009 Fifth International Conference on Information Assurance and Security.