Currently, energy resource exhaustion attacks targeted on modern autonomously working\nmobile devices are becoming more and more important. The underdevelopment of specialized\ndefenses against energy exhaustion attacks as well as their often hidden nature for the owner of\nthe target device determine a necessity of an integrated approach to modeling and evaluation of\nthis class of attacks and various types of intruders. The paper analyzes conditions of applicability\nof energy resource exhaustion attacks performed by various classes of intruders, models them on\nphysical implementations of devices for two application areas, and calculates their performance\nindicators. Application areas are a TCP/IP network of end-user mobile devices and a self-organizing\nmesh network designed for operational management and emergency response.
Loading....