2020
DOI: 10.1109/lwc.2019.2958910
|View full text |Cite
|
Sign up to set email alerts
|

Optimal Green Hybrid Attacks in Secure IoT

Abstract: In pursuance to understand the behavior of a potential green hybrid attacker in secure internet-of-things (IoT), this letter investigates optimal energy utilization from the attacker's viewpoint. Specifically, we propose a novel framework for optimizing the efficacy of a hybrid attacker, possessing capability to both eavesdrop and jam, while considering the underlying energy consumption. In particular, we maximize the attacker energy efficiency (AEE) in secure IoT by deriving the analytical solutions for joint… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
8
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
3
1
1

Relationship

2
3

Authors

Journals

citations
Cited by 12 publications
(9 citation statements)
references
References 13 publications
1
8
0
Order By: Relevance
“…Similarly, Fig. 3, validates the analytical expression for PDF f log 2 (1+γ SU AU ) (c) given by (21) which also represents PDF of SCĈ J under jamming mode in high SNR regime, as explained in (32). Therefore, equivalent representation of PDF can be expressed as fĈ J (c).…”
Section: A Validation Of Analysissupporting
confidence: 81%
See 3 more Smart Citations
“…Similarly, Fig. 3, validates the analytical expression for PDF f log 2 (1+γ SU AU ) (c) given by (21) which also represents PDF of SCĈ J under jamming mode in high SNR regime, as explained in (32). Therefore, equivalent representation of PDF can be expressed as fĈ J (c).…”
Section: A Validation Of Analysissupporting
confidence: 81%
“…The ongoing communication is assumed to be under security threat from a hybrid attacker with half‐duplex capability. It can over‐hear ongoing transmission as an eavesdropper through wiretapping or can act as a jammer causing interference to the information flow [1719]. It is further assumed to be present within the deployment region with some statistical information about its location.…”
Section: Proposed System Modelmentioning
confidence: 99%
See 2 more Smart Citations
“…This is why, studies on "green attacks" have emerged. In [10], [11], the authors focus on creating energy-efficient jamming attacks. In [10], authors create a model where the attacker estimates the distribution of the transmission period in the learning phase, and schedules its jamming attack according to this metric.…”
Section: Related Workmentioning
confidence: 99%