We study how ambient energy harvesting may be used as an attack vector in the battery-less Internet of Things (IoT). Battery-less IoT devices are employed in a multitude of application scenarios, including safety-critical ones such as biomedical implants and space systems, while relying on ambient energy harvesting to power their operation. Due to extreme scarcity of energy intakes and limited energy buffers, their executions become intermittent, alternating periods of active operation with periods of recharging their energy buffer while the device is off. We demonstrate that by exerting a limited control on the ambient supply of energy to the system, one can create situations of livelock, denial of service, and priority inversion, without requiring physical access to a device. Using machine learning and concepts of approximate computing, we design a technique that can detect energy attacks with 92%+ accuracy, corresponding to a 73+% improvement in accuracy over the baselines we consider, and run on extremely resource-constrained devices by imposing a limited overhead.
翻译:我们研究环境能量收集如何成为无电池物联网(IoT)中的攻击向量。无电池IoT设备应用于多个应用场景,包括生物医学植入物和空间系统等安全关键应用,同时依靠环境能量收集来供电。由于能量摄取极度稀缺且能量缓冲器受到限制,它们的执行变得间歇性,交替着活动期和关闭期的能量缓冲器充电。我们证明通过对系统提供环境能量的有限控制,可以在不需要物理访问设备的情况下创建存活锁定、拒绝服务和优先级反转的情况。利用机器学习和近似计算的概念,我们设计了一种可以在极度资源受限的设备上运行的技术,可以进行92%+精度的能量攻击检测,相对于我们考虑的基线,精度提高了73%+。