How are battery denial of service attacks defended against?

Since energy harvesting techniques have been used in some IMDs the concept of zero power consumption, Z PC schemes to protect all IMDs against better depletion has been increasingly important. Z PC schemes allow IMDs to authenticate external entities in order to determine, whether or not they are genuine.

In this way, the IMD can run security primitives that use RF (radio frequency) energy harvested from incoming communication messages only after the entity is authenticated. This ensures that the IMD does not deplete its battery responding to bogus messages from entities.

Shally Gupta IEEE Graduate Student Member

Great question! We don't have an answer ready for you right now. If you would like to help the community grow and learn please consider submitting this question to our Impact Creators. We will be posting answers to popular questions asked by the community as they become available.

Submit this question

Do you have a question for the IEEE Impact Creators?

Type your question here....

Close Navigation