利用
叠加原理
钥匙(锁)
计算机科学
无线电源传输
节点(物理)
非线性系统
无线
无线传感器网络
欺骗攻击
有界函数
无线网络
功率(物理)
计算机安全
计算机网络
电信
工程类
数学
数学分析
物理
结构工程
量子力学
作者
Chi Lin,Ziwei Yang,Jiankang Ren,Lei Wang,Wei Zhong,Guowei Wu,Qiang Zhang
标识
DOI:10.1109/icdcs54860.2022.00075
摘要
Wireless rechargeable sensor networks (WRSNs), which benefit from recent breakthroughs in Wireless Power Transfer (WPT) technology, emerge as very promising for network lifetime extension. Traditional methods concentrate on system performance improvement while little attention has been paid to security, making them vulnerable to novel attacks. In this paper, we develop a novel Charging Spoofing Attack (CSA), in which a mobile charger (MC) is charging a node intuitively. Nevertheless, it is launching an attack based on the nonlinear superposition principle of electromagnetic waves, causing the target node to be unable to receive any energy and finally exhausted in vain. First, we explain and model the nonlinear superposition effect through experiments, which points out the potential of launching such a novel attack. Second, we formalize the attacking problem as a charging uTility optImization problem with key noDe timE window constraints (TIDE). Then, we propose an approximation algorithm termed CSA to solve the TIDE problem with a bounded performance guarantee. Theoretical analyses are presented to exploit the feature of CSA. Finally, to demonstrate the outperformed features of our scheme, extensive simulations and test-bed experiments are conducted, revealing that CSA can exhaust at least 80% of key nodes without being detected.
科研通智能强力驱动
Strongly Powered by AbleSci AI