Table of Contents
IoT Hardware and Cybersecurity
IoT hardware attacks
References
IoT Hardware and Cybersecurity
IoT hardware attacks
Energy depletion attacks:
In this
1)
.
Vampire attacks:
Similar
2)
.
Routing attacks:
An attacker and Sybil attacks
3)
.
Jamming attacks:
channel
4)
. It is an attack targeting the IoT wireless network's physical or data link layer.
References
5)
6)
1)
,
2)
,
3)
rayes
4)
yanqiang
5)
rayes>Rayes, A.; Salam, S. “Internet of Things-From Hype to Reality”, Springer, 2017
6)
yanqiang>Yan-Qiang, S.; Xiao-dong, W. “Handbook of Research on Developments and Trends in Wireless Sensor Networks: From Principle to Practice”, IGI Global, 2010, DOI: 10.4018/978-1-61520-701-5.ch015