detection task. In our experimental setup, we
achieved promising initial results, showcasing the
high accuracy and energy efficiency of the proposed
system. Furthermore, a comparative analysis with
current research reveals our innovative approach to
detecting both common and silent EDAs. The latter
refers to situations in which an attacker compromises
sensors through vulnerabilities, depleting sensor
energy without generating network traffic.
Despite the obtained results, this work is currently
in progress and requires further refinement.
Primarily, we aim to enhance the learning phase by
incorporating the configuration of additional
parameters such as N, 𝜔, and 𝛿. This modification is
intended to render the system more adaptive to
different scenarios. Secondly, there is a need to
improve the report-sending task of the detection
module to prevent excessive communication in cases
of consecutive anomalies. It is crucial to address the
potential misuse of our current solution by an attacker
to generate additional traffic, leading to the
unnecessary energy waste of sensors. Thus, a solution
must be devised to mitigate this risk. Lastly, we
intend to propose an autonomous mitigation
technique deployed at sensors that is not dependent
on communication with external devices.
ACKNOWLEDGEMENTS
This study was financed in part by the Coordenação
de Aperfeiçoamento de Pessoal de Nível Superior -
Brasil (CAPES) - Finance Code 001. Thanks also to
FAPESP MCTIC/CGI (Research project
2018/23097-3).
REFERENCES
Alsirhani, A., Khan*, M. A., Alomari, A., Maryam, S.,
Younas, A., Iqbal, M., Siqqidi, M. H., & Ali, A. (2022).
Securing Low-Power Blockchain-Enabled IoT Devices
Against Energy Depletion Attack. ACM Transactions
on Internet Technology. https://doi.org/10.1145/351
1903
Han, G., Jiang, J., Shen, W., Shu, L., & Rodrigues, J.
(2013). IDSEP: A novel intrusion detection scheme
based on energy prediction in cluster-based wireless
sensor networks. IET Information Security, 7(2), 97–
105. https://doi.org/10.1049/iet-ifs.2012.0052
Instruments, T. (2018). MSP430FR596x , MSP430FR594x
Mixed-Signal Microcontrollers. https://www.ti.com/lit/
ds/symlink/msp430fr5994.pdf
Jan, S. U., Ahmed, S., Shakhov, V., & Koo, I. (2019).
Toward a Lightweight Intrusion Detection System for
the Internet of Things. IEEE Access, 7, 42450–42471.
https://doi.org/10.1109/ACCESS.2019.2907965
Kuaban, G. S., Gelenbe, E., Czachórski, T., Czekalski, P.,
& Tangka, J. K. (2023). Modelling of the Energy
Depletion Process and Battery Depletion Attacks for
Battery-Powered Internet of Things (IoT) Devices.
Sensors, 23(13). https://doi.org/10.3390/s23136183
Lee, T.-H., Wen, C.-H., Chang, L.-H., Chiang, H.-S., &
Hsieh, M.-C. (2014). A Lightweight Intrusion Detection
Scheme Based on Energy Consumption Analysis in
6LowPAN. Springer, Dordrecht. https://doi.org/10.10
07/978-94-007-7262-5_137
LoRa Alliance. (2020). LoRaWAN 1.0.4 Specification
Package. https://lora-alliance.org/resource_hub/
lorawan-104-specification-package/
Mikhaylov, K., Fujdiak, R., Pouttu, A., Miroslav, V.,
Malina, L., & Mlynek, P. (2019). Energy attack in
Lorawan: Experimental validation. ACM Proceedings
of the 14th ICARS, November 2020. https://doi.org/
10.1145/3339252.3340525
Neshenko, N., Bou-harb, E., Crichigno, J., Kaddoum, G., &
Ghani, N. (2019). Demystifying IoT Security : An
Exhaustive Survey on IoT Vulnerabilities and a First
Empirical Look on Internet-scale IoT Exploitations.
IEEE Communications Surveys & Tutorials.
https://doi.org/10.1109/COMST.2019.2910750
Nguyen, V. L., Lin, P. C., & Hwang, R. H. (2019). Energy
depletion attacks in low power wireless networks. IEEE
Access, 7, 51915–51932. https://doi.org/10.1109/
ACCESS.2019.2911424
Proto, A., & Carvalho, T. C. M. de B. (2020). Applying
distance metrics for anomaly detection of energy-based
attacks in IoT sensors. Brazilian Journal of
Development, 6(11), 92412–92435. https://doi.org/10.3
4117/bjdv6n11-595
Pu, C. (2019). Energy Depletion Attack Against Routing
Protocol in the Internet of Things. 16th IEEE CCNC
2019, https://doi.org/10.1109/CCNC.2019.8651771
Raza, U., Kulkarni, P., & Sooriyabandara, M. (2017). Low
Power Wide Area Networks: An Overview. IEEE
Communications Surveys & Tutorials, 19(2), 855–873.
https://doi.org/10.1109/COMST.2017.2652320
Sciancalepore, S., Tedeschi, P., Riasat, U., & Pietro, R. DI.
(2021). Mitigating Energy Depletion Attacks in IoT via
Random Time-Slotted Channel Access. 2021 IEEE
CNS 2021, 10–18. https://doi.org/10.1109/CNS53
000.2021.9705038
Slabicki, M., Premsankar, G., & Di Francesco, M. (2018).
Adaptive configuration of lora networks for dense IoT
deployments. IEEE/IFIP NOMS 2018: Cognitive
Management in a Cyber World, , 1–9.
https://doi.org/10.1109/NOMS.2018.8406255
Tzavaras, A., Mainas, N., & Petrakis, E. G. M. (2023).
Internet of Things OpenAPI framework for the Web of
Things. Internet of Things, 21(August 2022), 100675.
https://doi.org/10.1016/j.iot.2022.100675
Yang, X., Karampatzakis, E., Doerr, C., & Kuipers, F.
(2018). Security vulnerabilities in LoRaWAN.
Proceedings - ACM/IEEE IoTDI 2018, 129–140.
https://doi.org/10.1109/IoTDI.2018.00022