{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T03:04:48Z","timestamp":1771470288457,"version":"3.50.1"},"reference-count":23,"publisher":"MDPI AG","issue":"3","license":[{"start":{"date-parts":[[2020,3,10]],"date-time":"2020-03-10T00:00:00Z","timestamp":1583798400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Future Internet"],"abstract":"<jats:p>The continuous growth of the number of Internet of Things (IoT) devices and their inclusion to public and private infrastructures has introduced new applciations to the market and our day-to-day life. At the same time, these devices create a potential threat to personal and public security. This may be easily understood either due to the sensitivity of the collected data, or by our dependability to the devices\u2019 operation. Considering that most IoT devices are of low cost and are used for various tasks, such as monitoring people or controlling indoor environmental conditions, the security factor should be enhanced. This paper presents the exploitation of side-channel attack technique for protecting low-cost smart devices in an intuitive way. The work aims to extend the dataset provided to an Intrusion Detection Systems (IDS) in order to achieve a higher accuracy in anomaly detection. Thus, along with typical data provided to an IDS, such as network traffic, transmitted packets, CPU usage, etc., it is proposed to include information regarding the device\u2019s physical state and behaviour such as its power consumption, the supply current, the emitted heat, etc. Awareness of the typical operation of a smart device in terms of operation and functionality may prove valuable, since any deviation may warn of an operational or functional anomaly. In this paper, the deviation (either increase or decrease) of the supply current is exploited for this reason. This work aimed to affect the intrusion detection process of IoT and proposes for consideration new inputs of interest with a collateral interest of study. In parallel, malfunction of the device is also detected, extending this work\u2019s application to issues of reliability and maintainability. The results present 100% attack detection and this is the first time that a low-cost security solution suitable for every type of target devices is presented.<\/jats:p>","DOI":"10.3390\/fi12030048","type":"journal-article","created":{"date-parts":[[2020,3,10]],"date-time":"2020-03-10T11:59:36Z","timestamp":1583841576000},"page":"48","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Smart Devices Security Enhancement via Power Supply Monitoring"],"prefix":"10.3390","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6975-9064","authenticated-orcid":false,"given":"Dimitrios","family":"Myridakis","sequence":"first","affiliation":[{"name":"Department of Computer Science and Biomedical Informatics, University of Thessaly, 35131 Lamia, Greece"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2947-486X","authenticated-orcid":false,"given":"Georgios","family":"Spathoulas","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Biomedical Informatics, University of Thessaly, 35131 Lamia, Greece"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5431-2454","authenticated-orcid":false,"given":"Athanasios","family":"Kakarountas","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Biomedical Informatics, University of Thessaly, 35131 Lamia, Greece"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5228-6715","authenticated-orcid":false,"given":"Dimitrios","family":"Schinianakis","sequence":"additional","affiliation":[{"name":"Cyber Security Munich (CSM), NOKIA Bell Labs, 81541 Munich, Germany"}]}],"member":"1968","published-online":{"date-parts":[[2020,3,10]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"80","DOI":"10.1109\/MC.2017.201","article-title":"DDoS in the IoT: Mirai and other botnets","volume":"50","author":"Kolias","year":"2017","journal-title":"Computer"},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Deogirikar, J., and Vidhate, A. (2017, January 10\u201311). Security attacks in IoT: A survey. Proceedings of the 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud)(I-SMAC), Palladam, India.","DOI":"10.1109\/I-SMAC.2017.8058363"},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"3453","DOI":"10.1109\/COMST.2018.2855563","article-title":"A survey of iot-enabled cyberattacks: Assessing attack paths to critical infrastructures and services","volume":"20","author":"Stellios","year":"2018","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Sapienza, A., Bessi, A., Damodaran, S., Shakarian, P., Lerman, K., and Ferrara, E. (2017, January 18\u201321). Early warnings of cyber threats in online discussions. Proceedings of the 2017 IEEE International Conference on Data Mining Workshops (ICDMW), New Orleans, LA, USA.","DOI":"10.1109\/ICDMW.2017.94"},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Myridakis, D., Spathoulas, G., Kakarountas, A., Schinianakis, D., and Lueken, J. (2019, January 29\u201331). Monitoring Supply Current Thresholds for Smart Device\u2019s Security Enhancement. Proceedings of the 2019 15th International Conference on Distributed Computing in Sensor Systems (DCOSS), Santorini Island, Greece.","DOI":"10.1109\/DCOSS.2019.00058"},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Liu, Y., Wei, L., Zhou, Z., Zhang, K., Xu, W., and Xu, Q. (2016, January 24\u201328). On code execution tracking via power side-channel. Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, Vienna, Austria.","DOI":"10.1145\/2976749.2978299"},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Myridakis, D., Spathoulas, G., Kakarountas, A., Schoinianakis, D., and Lueken, J. (2018, January 2\u20135). Anomaly detection in IoT devices via monitoring of supply current. Proceedings of the 2018 IEEE 8th International Conference on Consumer Electronics-Berlin (ICCE-Berlin), Berlin, Germany.","DOI":"10.1109\/ICCE-Berlin.2018.8576178"},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Kitsos, P., Sklavos, N., and Voyiatzis, A.G. (2017). Ring oscillators and hardware Trojan detection. Hardware Security and Trust, Springer.","DOI":"10.1007\/978-3-319-44318-8"},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Keramidas, G., Voros, N., and H\u00fcbner, M. (2016). Components and Services for IoT Platforms: Paving the Way for IoT Standards, Springer.","DOI":"10.1007\/978-3-319-42304-3"},{"key":"ref_10","unstructured":"Smith, D.J. (2017). Reliability, Maintainability and Risk: Practical Methods for Engineers, Elsevier."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"2438","DOI":"10.1109\/TNS.2005.860674","article-title":"SEU-induced persistent error propagation in FPGAs","volume":"52","author":"Morgan","year":"2005","journal-title":"IEEE Trans. Nucl. Sci."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"1645","DOI":"10.1016\/j.future.2013.01.010","article-title":"Internet of Things (IoT): A vision, architectural elements, and future directions","volume":"29","author":"Gubbi","year":"2013","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"191","DOI":"10.14257\/ijsh.2015.9.12.20","article-title":"Threats Analysis, Requirements and Considerations for Secure Internet of Things","volume":"9","author":"Lee","year":"2015","journal-title":"Int. J. Smart Home"},{"key":"ref_14","first-page":"337","article-title":"The Internet of Things: A security point of view","volume":"26","author":"Li","year":"2016","journal-title":"Int. Res."},{"key":"ref_15","unstructured":"Angrishi, K. (2017). Turning Internet of Things (IoT) into Internet of Vulnerabilities (IoV): IoT Botnets. arXiv."},{"key":"ref_16","unstructured":"Dobbins, R. (2016). Mirai IoT botnet description and DDoS attack mitigation. Arbor Threat Intell., 28."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1109\/MCC.2016.28","article-title":"The quest for privacy in the Internet of Things","volume":"3","author":"Porambage","year":"2016","journal-title":"IEEE Cloud Comput."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"2728","DOI":"10.1002\/sec.795","article-title":"Privacy in the Internet of Things: Threats and challenges","volume":"7","author":"Ziegeldorf","year":"2014","journal-title":"Secur. Commun. Netw."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"426","DOI":"10.1016\/j.vlsi.2016.01.004","article-title":"A survey of hardware trojan threat and defense","volume":"55","author":"Li","year":"2016","journal-title":"Integr. VLSI J."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"2721","DOI":"10.1109\/ACCESS.2016.2575039","article-title":"A new characterization of hardware trojans","volume":"4","author":"Moein","year":"2016","journal-title":"IEEE Access"},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Sadeghi, A.R., Wachsmann, C., and Waidner, M. (2015, January 8\u201312). Security and privacy challenges in industrial Internet of Things. Proceedings of the 2015 52nd ACM\/EDAC\/IEEE Design Automation Conference (DAC), San Francisco, CA, USA.","DOI":"10.1145\/2744769.2747942"},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1109\/MSP.2011.67","article-title":"Stuxnet: Dissecting a cyber-warfare weapon","volume":"9","author":"Langner","year":"2011","journal-title":"IEEE Secur. Priv."},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Papafotikas, S., and Kakarountas, A. (2019, January 20\u201322). A Machine-Learning Clustering Approach for Intrusion Detection to IoT Devices. Proceedings of the 2019 4th South-East Europe Design Automation, Computer Engineering, Computer Networks and Social Media Conference (SEEDA-CECNSM), Piraeus, Greece.","DOI":"10.1109\/SEEDA-CECNSM.2019.8908520"}],"container-title":["Future Internet"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1999-5903\/12\/3\/48\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T09:05:46Z","timestamp":1760173546000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1999-5903\/12\/3\/48"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,3,10]]},"references-count":23,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2020,3]]}},"alternative-id":["fi12030048"],"URL":"https:\/\/doi.org\/10.3390\/fi12030048","relation":{},"ISSN":["1999-5903"],"issn-type":[{"value":"1999-5903","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,3,10]]}}}