EconPapers    
Economics at your fingertips  
 

Attacks on IoT: Side-Channel Power Acquisition Framework for Intrusion Detection

Dominic Lightbody (), Duc-Minh Ngo, Andriy Temko, Colin C. Murphy () and Emanuel Popovici
Additional contact information
Dominic Lightbody: Electrical and Electronic Engineering, University College Cork, T12 K8AF Cork, Ireland
Duc-Minh Ngo: Electrical and Electronic Engineering, University College Cork, T12 K8AF Cork, Ireland
Andriy Temko: Electrical and Electronic Engineering, University College Cork, T12 K8AF Cork, Ireland
Colin C. Murphy: Electrical and Electronic Engineering, University College Cork, T12 K8AF Cork, Ireland
Emanuel Popovici: Electrical and Electronic Engineering, University College Cork, T12 K8AF Cork, Ireland

Future Internet, 2023, vol. 15, issue 5, 1-27

Abstract: This study proposes the wider use of non-intrusive side-channel power data in cybersecurity for intrusion detection. An in-depth analysis of side-channel IoT power behaviour is performed on two well-known IoT devices—a Raspberry Pi 3 model B and a DragonBoard 410c—operating under normal conditions and under attack. Attacks from the categories of reconnaissance, brute force and denial of service are applied, and the side-channel power data of the IoT testbeds are then studied in detail. These attacks are used together to further compromise the IoT testbeds in a “capture-the-flag scenario”, where the attacker aims to infiltrate the device and retrieve a secret file. Some clear similarities in the side-channel power signatures of these attacks can be seen across the two devices. Furthermore, using the knowledge gained from studying the features of these attacks individually and the signatures witnessed in the “capture the flag scenario”, we show that security teams can reverse engineer attacks applied to their system to achieve a much greater understanding of the events that occurred during a breach. While this study presents behaviour signatures analysed visually, the acquired power series datasets will be instrumental for future human-centred AI-assisted intrusion detection.

Keywords: IoT hardware security; IoT side-channel power analysis; attack signatures; simple power analysis; cyber attacks on IoT; IoT time-series power data (search for similar items in EconPapers)
JEL-codes: O3 (search for similar items in EconPapers)
Date: 2023
References: View references in EconPapers View complete reference list from CitEc
Citations: View citations in EconPapers (2)

Downloads: (external link)
https://www.mdpi.com/1999-5903/15/5/187/pdf (application/pdf)
https://www.mdpi.com/1999-5903/15/5/187/ (text/html)

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:gam:jftint:v:15:y:2023:i:5:p:187-:d:1152009

Access Statistics for this article

Future Internet is currently edited by Ms. Grace You

More articles in Future Internet from MDPI
Bibliographic data for series maintained by MDPI Indexing Manager ().

 
Page updated 2025-03-19
Handle: RePEc:gam:jftint:v:15:y:2023:i:5:p:187-:d:1152009