IoT Hardware and Cybersecurity

IoT hardware attacks

  • Energy depletion attacks: In this 1).
  • Vampire attacks: Similar 2).
  • Routing attacks: An attacker and Sybil attacks 3).
  • Jamming attacks: channel 4). It is an attack targeting the IoT wireless network's physical or data link layer.

References

5)

6)

<references />

1) , 2) , 3)
:cite:rayes
4)
:cite:yanqiang
5)
:cite:rayes>Rayes, A.; Salam, S. “Internet of Things-From Hype to Reality”, Springer, 2017
6)
:cite:yanqiang>Yan-Qiang, S.; Xiao-dong, W. “Handbook of Research on Developments and Trends in Wireless Sensor Networks: From Principle to Practice”, IGI Global, 2010, DOI: 10.4018/978-1-61520-701-5.ch015
en/iot-reloaded/hardware_and_cybersecurity/test.txt · Last modified: by raivo.sell
CC Attribution-Share Alike 4.0 International
www.chimeric.de Valid CSS Driven by DokuWiki do yourself a favour and use a real browser - get firefox!! Recent changes RSS feed Valid XHTML 1.0