{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,14]],"date-time":"2025-12-14T08:30:22Z","timestamp":1765701022494,"version":"build-2065373602"},"reference-count":55,"publisher":"MDPI AG","issue":"5","license":[{"start":{"date-parts":[[2023,2,27]],"date-time":"2023-02-27T00:00:00Z","timestamp":1677456000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>Currently, within the world, cybercrime is becoming increasingly rampant\u2014often targeting civil infrastructure like power stations and other critical systems. A trend that is being noticed with these attacks is their increased use of embedded devices in denial-of-service (DoS) attacks. This creates a substantial risk to systems and infrastructures worldwide. Threats to embedded devices can be significant, and network stability and reliability can suffer, mainly through the risk of battery draining or complete system hang. This paper investigates such consequences through simulations of excessive loads, by staging attacks on embedded devices. Experimentation within Contiki OS focused on loads placed on physical and virtualised wireless sensor network (WSN) embedded devices by launching DoS attacks and by exploiting the Routing Protocol for Low Power and Lossy Networks (RPL). Results from these experiments were based on the metric of power draw, mainly the percentage increase over baseline and the pattern of it. The physical study relied on the output of the inline power analyser and the virtual study relied on the output of a Cooja plugin called PowerTracker. This involved experiments on both physical and virtual devices, and analysis of the power draws characteristics of WSN devices with a focus on embedded Linux platforms and Contiki OS. Experimental results provide evidence that peak power draining occurs with a malicious-node-to-sensor device ratio of 13-to-1. Results show a decline in power usage with a more expansive 16-sensor network after modelling and simulating a growing sensor network within the Cooja simulator.<\/jats:p>","DOI":"10.3390\/s23052605","type":"journal-article","created":{"date-parts":[[2023,2,27]],"date-time":"2023-02-27T02:15:37Z","timestamp":1677464137000},"page":"2605","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["An Analysis into Physical and Virtual Power Draw Characteristics of Embedded Wireless Sensor Network Devices under DoS and RPL-Based Attacks"],"prefix":"10.3390","volume":"23","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8870-4517","authenticated-orcid":false,"given":"Patryk","family":"Przybocki","sequence":"first","affiliation":[{"name":"Department of Computer Science, University of York, York YO10 5GH, UK"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4902-8226","authenticated-orcid":false,"given":"Vassilios G.","family":"Vassilakis","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of York, York YO10 5GH, UK"}]}],"member":"1968","published-online":{"date-parts":[[2023,2,27]]},"reference":[{"key":"ref_1","unstructured":"Sujay-Vailshery, L. (2023, January 20). Global Number of Connected IoT Devices 2015\u20132025, Statista. Available online: https:\/\/www.statista.com\/statistics\/1101442\/iot-number-of-connected-devices-worldwide\/."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"102001","DOI":"10.1016\/j.adhoc.2019.102001","article-title":"A comprehensive survey on enhancements and limitations of the RPL protocol: A focus on the objective function","volume":"96","author":"Lamaazi","year":"2020","journal-title":"Ad Hoc Netw."},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Lim, C. (2019). A survey on congestion control for RPL-based wireless sensor networks. Sensors, 19.","DOI":"10.3390\/s19112567"},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"102491","DOI":"10.1016\/j.adhoc.2021.102491","article-title":"Load balancing for RPL-based Internet of Things: A review","volume":"116","author":"Pancaroglu","year":"2021","journal-title":"Ad Hoc Netw."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"5666","DOI":"10.1109\/JSEN.2020.2973677","article-title":"Security of RPL based 6LoWPAN networks in the Internet of things: A review","volume":"20","author":"Verma","year":"2020","journal-title":"IEEE Sens. J."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"3831","DOI":"10.1109\/TIFS.2022.3214099","article-title":"Adversarial RL-based IDS for evolving data environment in 6LoWPAN","volume":"17","author":"Pasikhani","year":"2022","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Almusaylim, Z.A., Jhanjhi, N., and Alhumam, A. (2020). Detection and mitigation of RPL rank and version number attacks in the internet of things: SRPL-RP. Sensors, 20.","DOI":"10.20944\/preprints202007.0476.v1"},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"2057","DOI":"10.1007\/s11277-020-07139-y","article-title":"An intrusion detection system on ping of death attacks in IoT networks","volume":"112","author":"Abdollahi","year":"2020","journal-title":"Wirel. Pers. Commun."},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Garcia Ribera, E., Martinez Alvarez, B., Samuel, C., Ioulianou, P.P., and Vassilakis, V.G. (2022). An intrusion detection system for RPL-based IoT networks. Electronics, 11.","DOI":"10.3390\/electronics11234041"},{"key":"ref_10","unstructured":"Sobers, R. (2023, January 20). 166 Cybersecurity Statistics and Trends, Varonis. Available online: https:\/\/www.varonis.com\/blog\/cybersecurity-statistics."},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Kelly, C., Pitropakis, N., McKeown, S., and Lambrinoudakis, C. (2020, January 15\u201319). Testing and hardening IoT devices against the Mirai botnet. Proceedings of the 2020 International Conference on Cyber Security and Protection of Digital Services (Cyber Security), Dublin, Ireland.","DOI":"10.1109\/CyberSecurity49315.2020.9138887"},{"key":"ref_12","unstructured":"Kerbs, B. (2023, January 20). DDoS on Dyn Impacts Twitter, Spotify, Reddit, Kerbs on Security, Aug. Available online: https:\/\/krebsonsecurity.com\/2016\/10\/ddos-on-dyn-impacts-twitter-spotify-reddit\/."},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Singh, K., and Singh, A. (2018, January 25\u201327). Memcached DDoS exploits: Operations, vulnerabilities, preventions and mitigations. Proceedings of the 2018 IEEE 3rd International Conference on Computing, Communication and Security (ICCCS), Kathmandu, Nepal.","DOI":"10.1109\/CCCS.2018.8586810"},{"key":"ref_14","first-page":"37","article-title":"Battery drain denial-of-service attacks and defenses in the Internet of things","volume":"2","author":"Ioulianou","year":"2019","journal-title":"J. Telecommun. Inf. Technol."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"114","DOI":"10.1007\/s41635-017-0013-2","article-title":"A survey on function and system call hooking approaches","volume":"1","author":"Lopez","year":"2017","journal-title":"J. Hardw. Syst. Secur."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"96","DOI":"10.1080\/23335777.2020.1716268","article-title":"Battery draining attacks against edge computing nodes in IoT networks","volume":"6","author":"Smith","year":"2020","journal-title":"Cyber-Phys. Syst."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"239","DOI":"10.1007\/s12599-014-0334-4","article-title":"Industry 4.0","volume":"6","author":"Lasi","year":"2014","journal-title":"Bus. Inf. Syst. Eng."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"1942","DOI":"10.1109\/COMST.2020.2987688","article-title":"A survey on SCADA systems: Secure protocols, incidents, threats and tactics","volume":"22","author":"Pliatsios","year":"2020","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"135812","DOI":"10.1109\/ACCESS.2019.2926441","article-title":"A survey of security in SCADA networks: Current issues and future challenges","volume":"7","author":"Ghosh","year":"2019","journal-title":"IEEE Access"},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"63","DOI":"10.1109\/MIS.2018.111145022","article-title":"Identifying SCADA systems and their vulnerabilities on the internet of things: A text-mining approach","volume":"33","author":"Samtani","year":"2018","journal-title":"IEEE Intell. Syst."},{"key":"ref_21","unstructured":"Froggatt, A., and Lewis, D.P. (2023, January 20). Attacks on Ukraine Nuclear Plant\u2014What\u2019s at Stake? Chatham House. August 2022. Available online: https:\/\/www.chathamhouse.org\/2022\/08\/attacks-ukraine-nuclear-plant-whats-stake."},{"key":"ref_22","unstructured":"Baram, G. (2023, January 20). How the Cyberwar between Iran and Israel Has Intensified, Washington Post, July 2022. Available online: https:\/\/www.washingtonpost.com\/politics\/2022\/07\/25\/iran-israel-cyber-war\/."},{"key":"ref_23","unstructured":"Orenstein, M. (2023, January 20). Russia\u2019s Use of Cyberattacks: Lessons from the Second Ukraine War, Foreign Policy Research Institute. Available online: https:\/\/www.fpri.org\/article\/2022\/06\/russias-use-of-cyberattacks-lessons-from-the-second-ukraine-war\/."},{"key":"ref_24","unstructured":"(2023, January 20). Ukraine Conflict: How Are Drones Being Used?\u2019 BBC News, July 2022. Available online: https:\/\/www.bbc.co.uk\/news\/world-62225830."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"102894","DOI":"10.1016\/j.adhoc.2022.102894","article-title":"A survey of cyber security threats and solutions for UAV communications and flying ad-hoc networks","volume":"133","author":"Tsao","year":"2022","journal-title":"Ad Hoc Netw."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"104340","DOI":"10.1016\/j.micpro.2021.104340","article-title":"A review on communication protocols for autonomous unmanned aerial vehicles for inspection application","volume":"86","author":"Shi","year":"2021","journal-title":"Microprocess. Microsyst."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"212220","DOI":"10.1109\/ACCESS.2020.3039985","article-title":"Systematic literature review on IoT-based botnet attack","volume":"8","author":"Ali","year":"2020","journal-title":"IEEE Access"},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"McNulty, L., and Vassilakis, V.G. (2022, January 20\u201322). IoT botnets: Characteristics, exploits, attack capabilities, and targets. Proceedings of the 13th International Symposium on Communication Systems, Networks and Digital Signal Processing (CSNDSP), Porto, Portugal.","DOI":"10.1109\/CSNDSP54353.2022.9908039"},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Ioulianou, P.P., and Vassilakis, V.G. (2019, January 14\u201318). Denial-of-service attacks and countermeasures in the RPL-based Internet of Things. Proceedings of the International Workshop on Attacks and Defenses for Internet-of-Things (ADIoT), Luxembourg.","DOI":"10.1007\/978-3-030-42048-2_24"},{"key":"ref_30","unstructured":"Goodin, D. (2023, January 20). Microsoft Fends off Record-Breaking 3.47tbps Ddos Attack, Ars Technica, January 2022. Available online: https:\/\/arstechnica.com\/information-technology\/2022\/01\/microsoft-fends-off-record-breaking-3-47-tbps-ddos-attack\/."},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Lauridsen, M., Krigslund, R., Rohr, M., and Madueno, G. (2018, January 3\u20136). An empirical NB-IoT power consumption model for battery lifetime estimation. Proceedings of the IEEE 87th Vehicular Technology Conference (VTC Spring), Porto, Portugal.","DOI":"10.1109\/VTCSpring.2018.8417653"},{"key":"ref_32","doi-asserted-by":"crossref","unstructured":"Gray, C., Ayre, R., Hinton, K., and Tucker, R.S. (2015, January 8\u201312). Power consumption of IoT access network technologies. Proceedings of the International Conference on Communication (ICC), London, UK.","DOI":"10.1109\/ICCW.2015.7247606"},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"100103","DOI":"10.1016\/j.smhl.2019.100103","article-title":"IoT botnet detection via power consumption modeling","volume":"15","author":"Jung","year":"2020","journal-title":"Smart Health"},{"key":"ref_34","doi-asserted-by":"crossref","unstructured":"Yu, F., Zhu, Z., and Fan, Z. (2017, January 9\u201311). Study on the feasibility of LoRaWAN for smart city applications. Proceedings of the 2017 IEEE 13th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), Rome, Italy.","DOI":"10.1109\/WiMOB.2017.8115748"},{"key":"ref_35","doi-asserted-by":"crossref","unstructured":"Mdhaffar, A., Chaari, T., Larbi, K., Jmaiel, M., and Freisleben, B. (2017, January 6\u20138). IoT-based health monitoring via LoRaWAN. Proceedings of the IEEE EUROCON 2017 17th International Conference on Smart Technologies, Ohrid, North Macedonia.","DOI":"10.1109\/EUROCON.2017.8011165"},{"key":"ref_36","doi-asserted-by":"crossref","unstructured":"Lu, X., Kim, I.H., Xhafa, A., Zhou, J., and Tsai, K. (2017, January 5\u20138). Reaching 10-years of battery life for industrial IoT wireless sensor networks. Proceedings of the Symposium on VLSI Circuits, Kyoto, Japan.","DOI":"10.23919\/VLSIC.2017.8008550"},{"key":"ref_37","doi-asserted-by":"crossref","unstructured":"Pinto, S., Cabral, J., and Gomes, T. (2017, January 22\u201325). We-care: An IoT-based health care system for elderly people. Proceedings of the 2017 IEEE International Conference on Industrial Technology (ICIT), Toronto, ON, Canada.","DOI":"10.1109\/ICIT.2017.7915565"},{"key":"ref_38","unstructured":"(2023, January 20). Intel, Intel Launches Low-Power, High-Performance Silvermont Microarchitecture, Intel Newsroom, May 2013. Available online: https:\/\/newsroom.intel.com\/news-releases\/intel-launches-low-power-high-performance-silvermont-microarchitecture\/."},{"key":"ref_39","unstructured":"List, J. (2023, January 20). Intel Discontinues Joule, Galileo, and Edison Product Lines, Hackaday, June 2017. Available online: https:\/\/hackaday.com\/2017\/06\/19\/intel-discontinues-joule-galileo-and-edison-product-lines\/."},{"key":"ref_40","unstructured":"(2023, January 20). Raspberry Pi. Available online: https:\/\/www.raspberrypi.com\/."},{"key":"ref_41","unstructured":"(2023, January 20). Pimoroni, Pico Wireless Pack. Available online: https:\/\/shop.pimoroni.com\/products\/pico-wireless-pack."},{"key":"ref_42","unstructured":"Mistry, S. (2023, January 20). Pico-Rmii-Ethernet, GitHub, May 2022. Available online: https:\/\/github.com\/sandeepmistry\/pico-rmii-ethernet."},{"key":"ref_43","unstructured":"\u00d6sterlind, F. (2023, January 20). A Sensor Network Simulator for the Contiki os, Digitala Vetenskapliga Arkivet. Available online: http:\/\/www.diva-portal.org\/smash\/record.jsf?pid=diva2%3A1041560&dswid=-2196."},{"key":"ref_44","unstructured":"(2023, January 20). IoT Lab. Available online: https:\/\/www.iot-lab.info\/."},{"key":"ref_45","unstructured":"(2023, January 20). Thc-IPv6, Kali Linux. Available online: https:\/\/www.kali.org\/tools\/thc-ipv6\/."},{"key":"ref_46","doi-asserted-by":"crossref","unstructured":"Samuel, C., Alvarez, B.M., Ribera, E.G., Ioulianou, P.P., and Vassilakis, V.G. (2020, January 20\u201322). Performance evaluation of a wormhole detection method using round-trip times and hop counts in RPL-based 6LoWPAN networks. Proceedings of the 12th IEEE\/IET International Symposium on Communication Systems, Networks and Digital Signal Processing (CSNDSP), Porto, Portugal.","DOI":"10.1109\/CSNDSP49049.2020.9249612"},{"key":"ref_47","doi-asserted-by":"crossref","unstructured":"Ribera, E.G., Alvarez, B.M., Samuel, C., Ioulianou, P.P., and Vassilakis, V.G. (2020, January 20\u201322). Heartbeat-based detection of blackhole and greyhole attacks in RPL networks. Proceedings of the 12th IEEE\/IET International Symposium on Communication Systems, Networks and Digital Signal Processing (CSNDSP), Porto, Portugal.","DOI":"10.1109\/CSNDSP49049.2020.9249519"},{"key":"ref_48","first-page":"24","article-title":"Power consumption in wireless sensor network: A machine learning approach","volume":"6","author":"Hasan","year":"2022","journal-title":"Comput. Perform. Commun. Syst."},{"key":"ref_49","doi-asserted-by":"crossref","first-page":"3053","DOI":"10.1007\/s11277-021-09040-8","article-title":"FBDR-Fuzzy based DDoS attack detection and recovery mechanism for wireless sensor networks","volume":"122","author":"Pajila","year":"2021","journal-title":"Wirel. Pers. Commun."},{"key":"ref_50","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1016\/j.diin.2019.03.002","article-title":"A survey of electromagnetic side-channel attacks and discussion on their case-progressing potential for digital forensics","volume":"29","author":"Sayakkara","year":"2019","journal-title":"Digit. Investig."},{"key":"ref_51","doi-asserted-by":"crossref","unstructured":"Abrishamchi, M.A., Zainal, A., Ghaleb, F.A., Qasem, S.N., and Albarrak, A.M. (2022). Smart home privacy protection methods against a passive wireless Snooping side-channel attack. Sensors, 22.","DOI":"10.3390\/s22218564"},{"key":"ref_52","doi-asserted-by":"crossref","unstructured":"Xie, J.Y., Tseng, Y.M., and Huang, S.S. (2022). Leakage-resilient anonymous multireceiver certificateless encryption resistant to side-channel attacks. IEEE Syst. J., 1\u201312.","DOI":"10.1109\/JSYST.2022.3204902"},{"key":"ref_53","doi-asserted-by":"crossref","first-page":"13071","DOI":"10.1109\/ACCESS.2022.3146431","article-title":"Improved beetle antennae algorithm based on localization for jamming attack in wireless sensor networks","volume":"10","author":"Lyu","year":"2022","journal-title":"IEEE Access"},{"key":"ref_54","first-page":"1","article-title":"Reproducibility enhancement by optimized power analysis attacks in vulnerability assessment of IoT transducers","volume":"70","author":"Arpaia","year":"2021","journal-title":"IEEE Trans. Instrum. Meas."},{"key":"ref_55","doi-asserted-by":"crossref","first-page":"51915","DOI":"10.1109\/ACCESS.2019.2911424","article-title":"Energy depletion attacks in low power wireless networks","volume":"7","author":"Nguyen","year":"2019","journal-title":"IEEE Access"}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/23\/5\/2605\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T18:43:26Z","timestamp":1760121806000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/23\/5\/2605"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,2,27]]},"references-count":55,"journal-issue":{"issue":"5","published-online":{"date-parts":[[2023,3]]}},"alternative-id":["s23052605"],"URL":"https:\/\/doi.org\/10.3390\/s23052605","relation":{},"ISSN":["1424-8220"],"issn-type":[{"type":"electronic","value":"1424-8220"}],"subject":[],"published":{"date-parts":[[2023,2,27]]}}}