IoT Hardware and Cybersecurity

IoT hardware attacks

  • Energy depletion attacks: In this [1].
  • Vampire attacks: Similar [1].
  • Routing attacks: An attacker and Sybil attacks [1].
  • Jamming attacks: channel [2]. It is an attack targeting the IoT wireless network's physical or data link layer.

References

<references />


1. a, b, c Rayes, A.; Salam, S. “Internet of Things-From Hype to Reality”, Springer, 2017
2. a Yan-Qiang, S.; Xiao-dong, W. “Handbook of Research on Developments and Trends in Wireless Sensor Networks: From Principle to Practice”, IGI Global, 2010, DOI: 10.4018/978-1-61520-701-5.ch015
en/iot-reloaded/hardware_and_cybersecurity/test.txt · Last modified: 2025/05/14 18:08 by raivo.sell
CC Attribution-Share Alike 4.0 International
www.chimeric.de Valid CSS Driven by DokuWiki do yourself a favour and use a real browser - get firefox!! Recent changes RSS feed Valid XHTML 1.0