{"id":"https://openalex.org/W4210949088","doi":"https://doi.org/10.1109/cns53000.2021.9705038","title":"Mitigating Energy Depletion Attacks in IoT via Random Time-Slotted Channel Access","display_name":"Mitigating Energy Depletion Attacks in IoT via Random Time-Slotted Channel Access","publication_year":2021,"publication_date":"2021-10-04","ids":{"openalex":"https://openalex.org/W4210949088","doi":"https://doi.org/10.1109/cns53000.2021.9705038"},"language":"en","primary_location":{"id":"doi:10.1109/cns53000.2021.9705038","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cns53000.2021.9705038","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 IEEE Conference on Communications and Network Security (CNS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5088679207","display_name":"Savio Sciancalepore","orcid":"https://orcid.org/0000-0003-0974-3639"},"institutions":[{"id":"https://openalex.org/I83019370","display_name":"Eindhoven University of Technology","ror":"https://ror.org/02c2kyt77","country_code":"NL","type":"education","lineage":["https://openalex.org/I83019370"]}],"countries":["NL"],"is_corresponding":true,"raw_author_name":"Savio Sciancalepore","raw_affiliation_strings":["Eindhoven University of Technology,Eindhoven,Netherlands","Eindhoven University of Technology, Eindhoven, Netherlands"],"affiliations":[{"raw_affiliation_string":"Eindhoven University of Technology,Eindhoven,Netherlands","institution_ids":["https://openalex.org/I83019370"]},{"raw_affiliation_string":"Eindhoven University of Technology, Eindhoven, Netherlands","institution_ids":["https://openalex.org/I83019370"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5084927711","display_name":"Pietro Tedeschi","orcid":"https://orcid.org/0000-0003-3324-3706"},"institutions":[{"id":"https://openalex.org/I4210144839","display_name":"Hamad bin Khalifa University","ror":"https://ror.org/03eyq4y97","country_code":"QA","type":"education","lineage":["https://openalex.org/I4210144839"]}],"countries":["QA"],"is_corresponding":false,"raw_author_name":"Pietro Tedeschi","raw_affiliation_strings":["Hamad Bin Khalifa University (HBKU),Division of Information and Computing Technology (ICT) College of Science and Engineering (CSE),Doha,Qatar","Division of Information and Computing Technology (ICT) College of Science and Engineering (CSE), Hamad Bin Khalifa University (HBKU), Doha, Qatar"],"affiliations":[{"raw_affiliation_string":"Hamad Bin Khalifa University (HBKU),Division of Information and Computing Technology (ICT) College of Science and Engineering (CSE),Doha,Qatar","institution_ids":["https://openalex.org/I4210144839"]},{"raw_affiliation_string":"Division of Information and Computing Technology (ICT) College of Science and Engineering (CSE), Hamad Bin Khalifa University (HBKU), Doha, Qatar","institution_ids":["https://openalex.org/I4210144839"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5001818186","display_name":"Usman Riasat","orcid":null},"institutions":[{"id":"https://openalex.org/I4210144839","display_name":"Hamad bin Khalifa University","ror":"https://ror.org/03eyq4y97","country_code":"QA","type":"education","lineage":["https://openalex.org/I4210144839"]}],"countries":["QA"],"is_corresponding":false,"raw_author_name":"Usman Riasat","raw_affiliation_strings":["Hamad Bin Khalifa University (HBKU),Division of Information and Computing Technology (ICT) College of Science and Engineering (CSE),Doha,Qatar","Division of Information and Computing Technology (ICT) College of Science and Engineering (CSE), Hamad Bin Khalifa University (HBKU), Doha, Qatar"],"affiliations":[{"raw_affiliation_string":"Hamad Bin Khalifa University (HBKU),Division of Information and Computing Technology (ICT) College of Science and Engineering (CSE),Doha,Qatar","institution_ids":["https://openalex.org/I4210144839"]},{"raw_affiliation_string":"Division of Information and Computing Technology (ICT) College of Science and Engineering (CSE), Hamad Bin Khalifa University (HBKU), Doha, Qatar","institution_ids":["https://openalex.org/I4210144839"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5065932621","display_name":"Roberto Di Pietro","orcid":"https://orcid.org/0000-0003-1909-0336"},"institutions":[{"id":"https://openalex.org/I4210144839","display_name":"Hamad bin Khalifa University","ror":"https://ror.org/03eyq4y97","country_code":"QA","type":"education","lineage":["https://openalex.org/I4210144839"]}],"countries":["QA"],"is_corresponding":false,"raw_author_name":"Roberto Di Pietro","raw_affiliation_strings":["Hamad Bin Khalifa University (HBKU),Division of Information and Computing Technology (ICT) College of Science and Engineering (CSE),Doha,Qatar","Division of Information and Computing Technology (ICT) College of Science and Engineering (CSE), Hamad Bin Khalifa University (HBKU), Doha, Qatar"],"affiliations":[{"raw_affiliation_string":"Hamad Bin Khalifa University (HBKU),Division of Information and Computing Technology (ICT) College of Science and Engineering (CSE),Doha,Qatar","institution_ids":["https://openalex.org/I4210144839"]},{"raw_affiliation_string":"Division of Information and Computing Technology (ICT) College of Science and Engineering (CSE), Hamad Bin Khalifa University (HBKU), Doha, Qatar","institution_ids":["https://openalex.org/I4210144839"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5088679207"],"corresponding_institution_ids":["https://openalex.org/I83019370"],"apc_list":null,"apc_paid":null,"fwci":0.4584,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.67484561,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":95,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"10","last_page":"18"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9972000122070312,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9969000220298767,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.7639142274856567},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.7433162927627563},{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.7302933931350708},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7195826172828674},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.659837007522583},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6120114922523499},{"id":"https://openalex.org/keywords/energy","display_name":"Energy (signal processing)","score":0.5023934841156006},{"id":"https://openalex.org/keywords/random-access","display_name":"Random access","score":0.4816519320011139},{"id":"https://openalex.org/keywords/efficient-energy-use","display_name":"Efficient energy use","score":0.4809522032737732},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.45793795585632324},{"id":"https://openalex.org/keywords/countermeasure","display_name":"Countermeasure","score":0.4295027554035187},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.2453337013721466},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.15254011750221252},{"id":"https://openalex.org/keywords/electrical-engineering","display_name":"Electrical engineering","score":0.0871480405330658}],"concepts":[{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.7639142274856567},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.7433162927627563},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.7302933931350708},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7195826172828674},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.659837007522583},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6120114922523499},{"id":"https://openalex.org/C186370098","wikidata":"https://www.wikidata.org/wiki/Q442787","display_name":"Energy (signal processing)","level":2,"score":0.5023934841156006},{"id":"https://openalex.org/C101722063","wikidata":"https://www.wikidata.org/wiki/Q218825","display_name":"Random access","level":2,"score":0.4816519320011139},{"id":"https://openalex.org/C2742236","wikidata":"https://www.wikidata.org/wiki/Q924713","display_name":"Efficient energy use","level":2,"score":0.4809522032737732},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.45793795585632324},{"id":"https://openalex.org/C21593369","wikidata":"https://www.wikidata.org/wiki/Q1032176","display_name":"Countermeasure","level":2,"score":0.4295027554035187},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.2453337013721466},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.15254011750221252},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.0871480405330658},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C146978453","wikidata":"https://www.wikidata.org/wiki/Q3798668","display_name":"Aerospace engineering","level":1,"score":0.0},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.1109/cns53000.2021.9705038","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cns53000.2021.9705038","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 IEEE Conference on Communications and Network Security (CNS)","raw_type":"proceedings-article"},{"id":"pmh:oai:pure.tue.nl:openaire_cris_publications/68e0195a-ef55-415f-88e0-28980df64f73","is_oa":false,"landing_page_url":"https://research.tue.nl/en/publications/68e0195a-ef55-415f-88e0-28980df64f73","pdf_url":null,"source":{"id":"https://openalex.org/S4406922641","display_name":"TU/e Research Portal","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Sciancalepore, S, Tedeschi, P, Riasat, U & Di Pietro, R 2022, Mitigating Energy Depletion Attacks in IoT via Random Time-Slotted Channel Access. in 2021 IEEE Conference on Communications and Network Security, CNS 2021., 9705038, Institute of Electrical and Electronics Engineers, pp. 10-18, 2021 IEEE Conference on Communications and Network Security, CNS 2021, Tempe, Arizona, United States, 4/10/21. https://doi.org/10.1109/CNS53000.2021.9705038","raw_type":"info:eu-repo/semantics/publishedVersion"},{"id":"pmh:oai:pure.tue.nl:publications/68e0195a-ef55-415f-88e0-28980df64f73","is_oa":false,"landing_page_url":"http://www.scopus.com/inward/record.url?scp=85125633175&partnerID=8YFLogxK","pdf_url":null,"source":{"id":"https://openalex.org/S4406922641","display_name":"TU/e Research Portal","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Sciancalepore, S, Tedeschi, P, Riasat, U & Di Pietro, R 2022, Mitigating Energy Depletion Attacks in IoT via Random Time-Slotted Channel Access. in 2021 IEEE Conference on Communications and Network Security, CNS 2021., 9705038, Institute of Electrical and Electronics Engineers, pp. 10-18, 2021 IEEE Conference on Communications and Network Security, CNS 2021, Tempe, Arizona, United States, 4/10/21. https://doi.org/10.1109/CNS53000.2021.9705038","raw_type":"info:eu-repo/semantics/publishedVersion"},{"id":"pmh:tue:oai:pure.tue.nl:publications/68e0195a-ef55-415f-88e0-28980df64f73","is_oa":false,"landing_page_url":"https://research.tue.nl/nl/publications/68e0195a-ef55-415f-88e0-28980df64f73","pdf_url":null,"source":{"id":"https://openalex.org/S4306401843","display_name":"Data Archiving and Networked Services (DANS)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1322597698","host_organization_name":"Royal Netherlands Academy of Arts and Sciences","host_organization_lineage":["https://openalex.org/I1322597698"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"2021 IEEE Conference on Communications and Network Security, CNS 2021, 10 - 18","raw_type":"info:eu-repo/semantics/conferencepaper"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.8899999856948853,"display_name":"Affordable and clean energy","id":"https://metadata.un.org/sdg/7"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320332753","display_name":"Qatar National Research Fund","ror":"https://ror.org/01svaqq28"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":24,"referenced_works":["https://openalex.org/W1966104830","https://openalex.org/W1987264479","https://openalex.org/W2000687010","https://openalex.org/W2168079492","https://openalex.org/W2175666623","https://openalex.org/W2342690304","https://openalex.org/W2526592272","https://openalex.org/W2761323174","https://openalex.org/W2896148134","https://openalex.org/W2898924899","https://openalex.org/W2900583644","https://openalex.org/W2941918278","https://openalex.org/W2969468102","https://openalex.org/W2982214571","https://openalex.org/W2985126008","https://openalex.org/W3043856359","https://openalex.org/W3095240714","https://openalex.org/W3103805105","https://openalex.org/W3119223610","https://openalex.org/W3128090530","https://openalex.org/W4213054959","https://openalex.org/W6744682325","https://openalex.org/W6786493955","https://openalex.org/W6787949857"],"related_works":["https://openalex.org/W2378749186","https://openalex.org/W2364088131","https://openalex.org/W4386482731","https://openalex.org/W4385302085","https://openalex.org/W2360429410","https://openalex.org/W2765763546","https://openalex.org/W4256682929","https://openalex.org/W2362741838","https://openalex.org/W2006319822","https://openalex.org/W2123547618"],"abstract_inverted_index":{"Energy":[0],"depletion":[1,55,103,164,206],"attacks":[2,56,104],"represent":[3],"a":[4,28,98,121,154,199,210],"challenging":[5],"threat":[6],"towards":[7],"the":[8,63,66,72,129,135,141,159,168,174,194,212,226,230],"secure":[9],"and":[10,41,65,86,219],"reliable":[11],"deployment":[12],"of":[13,16,62,68,123,138,170,237],"low-power":[14],"Internet":[15],"Things":[17],"(IoT)":[18],"networks.":[19],"Indeed,":[20],"by":[21,120],"simply":[22],"transmitting":[23],"canning":[24],"standard-compliant":[25],"packets":[26,82],"to":[27,46,52,83,101,158,196,203,215,223],"target":[29,37,84],"IoT":[30,106,125,149,188],"device,":[31],"an":[32,180],"adversary":[33,195,213],"can":[34],"quickly":[35],"exhaust":[36],"devices":[38,85,126],"available":[39],"energy":[40,54,90,102,145,163,205,222],"reduce":[42],"network":[43],"lifetime,":[44],"leading":[45],"extensive":[47,181],"Denial-of-Service":[48],"(DoS).":[49],"Current":[50],"solutions":[51],"tackle":[53],"mainly":[57],"rely":[58],"on":[59,147,185],"ex-post":[60],"detection":[61,155],"attack":[64],"adoption":[67],"follow-up":[69],"countermeasures.":[70],"Still,":[71],"cited":[73],"approaches":[74],"cannot":[75],"prevent":[76],"external":[77],"adversaries":[78],"from":[79],"sending":[80],"wireless":[81],"draining":[87],"down":[88],"their":[89],"budget.":[91],"In":[92,208],"this":[93],"paper,":[94],"we":[95],"present":[96],"RTSCA,":[97],"novel":[99],"countermeasure":[100],"in":[105,173],"networks,":[107],"that":[108,166,191],"leverages":[109,167],"Random":[110],"Time-Slotted":[111],"Channel":[112],"Access.":[113],"RTSCA":[114,151,192],"randomizes":[115],"channel":[116],"access":[117],"operations":[118],"executed":[119],"couple":[122],"directly-connected":[124],"operating":[127],"through":[128],"IEEE":[130],"802.15.4":[131],"MAC,":[132],"significantly":[133],"reducing":[134],"time":[136,232],"window":[137],"opportunity":[139],"for":[140],"attacker,":[142],"with":[143],"little-to-none":[144],"cost":[146],"legitimate":[148],"devices.":[150],"also":[152],"includes":[153],"mechanism":[156],"targeted":[157],"recently-introduced":[160],"Truncate-after-Preamble":[161],"(TaP)":[162],"attacks,":[165],"observation":[169],"error":[171],"patterns":[172],"received":[175],"packets.":[176],"We":[177],"carried":[178],"out":[179,225],"performance":[182],"assessment":[183],"campaign":[184],"real":[186],"Openmote-b":[187],"nodes,":[189],"showing":[190],"forces":[193],"behave":[197],"as":[198],"(sub-optimal)":[200],"reactive":[201],"jammer":[202],"achieve":[204],"attacks.":[207],"such":[209],"setting,":[211],"has":[214],"spend":[216],"between":[217],"42:5%":[218],"55%":[220],"more":[221],"carry":[224],"attack,":[227],"while":[228],"at":[229],"same":[231],"having":[233],"no":[234],"deterministic":[235],"chances":[236],"success.":[238]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
