Abstract | ||
---|---|---|
Wireless rechargeable sensor networks (WRSNs), which benefit from recent breakthroughs in Wireless Power Transfer (WPT) technology, emerge as very promising for network lifetime extension. Traditional methods concentrate on system performance improvement while little attention has been paid to security, making them vulnerable to novel attacks. In this paper, we develop a novel Charging Spoofing Attack (CSA), in which a mobile charger (MC) is charging a node intuitively. Nevertheless, it is launching an attack based on the nonlinear superposition principle of electromagnetic waves, causing the target node to be unable to receive any energy and finally exhausted in vain. First, we explain and model the nonlinear superposition effect through experiments, which points out the potential of launching such a novel attack. Second, we formalize the attacking problem as a charging uTility optImization problem with key noDe timE window constraints (TIDE). Then, we propose an approximation algorithm termed CSA to solve the TIDE problem with a bounded performance guarantee. Theoretical analyses are presented to exploit the feature of CSA. Finally, to demonstrate the outperformed features of our scheme, extensive simulations and test-bed experiments are conducted, revealing that CSA can exhaust at least 80% of key nodes without being detected. |
Year | DOI | Venue |
---|---|---|
2022 | 10.1109/ICDCS54860.2022.00075 | 2022 IEEE 42nd International Conference on Distributed Computing Systems (ICDCS) |
Keywords | DocType | ISSN |
Wireless rechargeable sensor networks,WRSNs,Wireless Power Transfer technology,WPT,network lifetime extension,system performance improvement while little attention,novel Charging Spoofing Attack,CSA,mobile charger,MC,nonlinear superposition principle,electromagnetic waves,target node,nonlinear superposition effect,novel attack,attacking problem,charging uTility optImization problem,key noDe timE window constraints,TIDE problem,bounded performance guarantee,test-bed experiments,key nodes | Conference | 1063-6927 |
ISBN | Citations | PageRank |
978-1-6654-7178-7 | 0 | 0.34 |
References | Authors | |
25 | 7 |
Name | Order | Citations | PageRank |
---|---|---|---|
Chi Lin | 1 | 8 | 5.86 |
Ziwei Yang | 2 | 0 | 0.34 |
Jiankang Ren | 3 | 0 | 0.34 |
Lei Wang | 4 | 433 | 64.21 |
Wei Zhong | 5 | 0 | 0.34 |
Guowei Wu | 6 | 75 | 14.81 |
Qiang Zhang | 7 | 242 | 21.66 |