This shows you the differences between two versions of the page.
| Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
| en:iot-reloaded:hardware_and_cybersecurity:test [2025/05/14 14:23] – raivo.sell | en:iot-reloaded:hardware_and_cybersecurity:test [2025/05/14 18:08] (current) – old revision restored (2025/05/14 18:01) raivo.sell | ||
|---|---|---|---|
| Line 1: | Line 1: | ||
| ====== IoT Hardware and Cybersecurity ====== | ====== IoT Hardware and Cybersecurity ====== | ||
| - | |||
| ===== IoT hardware attacks ===== | ===== IoT hardware attacks ===== | ||
| - | * Firmware-base attacks: When a new security threat is discovered, a new firmware update is required to obtain an updated version to address the security threat. The firmware, security configuration and other device features can be cloned. The attacker can also upgrade the firmware of a device with malicious software (( O. Garcia-Morchon, | ||
| - | * Eavesdropping and man-in-the-middle attacks: Data exchange should be performed securely, making data interception by a third party impossible. Traditional data encryption schemes cannot be implemented in IoT devices, requiring lightweight encryption, which is not straightforward and is sometimes ignored by manufacturers. Transmitting unencrypted IoT data, including security data, makes IoT networks susceptible to eavesdropping and man-in-the-middle attacks. | ||
| - | * test 1 [(: | ||
| - | * test 2 [(: | ||
| - | * Energy depletion attacks: In this kind of attack, an attacker tries to increase the energy consumption of a battery-powered IoT device significantly, | ||
| - | * Vampire attacks: In this kind of attack, an attacker tries to increase the energy consumption of a battery-powered IoT device significantly, | ||
| - | * Routing attacks: An attacker may manipulate the routing information of the devices to create routing loops, selectively forward packets or intend to use longer routes to increase energy consumption. Some routing attacks include sinkholes, selective forwarding, wormholes, and Sybil attacks | ||
| - | * Jamming attacks: A denial of service attack in a shared wireless communication channel where a user may prevent other users from using the shared channel ((S. Yan-Qiang, W. Xiao-dong, Handbook of Research on Developments and Trends in Wireless Sensor Networks: From Principle to Practice, DOI: 10.4018/ | ||
| - | [( :ref:prog:Hunt& | + | * **Energy depletion attacks:** In this ((:cite:rayes)). |
| - | | authors | + | |
| - | | title = The Pragmatic Programmer: | + | * **Vampire attacks:** Similar |
| - | From Journeyman to Master | + | |
| - | | published = 1999 | + | * **Routing attacks:** An attacker and Sybil attacks ((: |
| - | | publisher = Addison-Wesley Professional | + | |
| - | | pages = 352 | + | * **Jamming attacks:** channel ((: |
| - | | isbn | + | |
| - | | url = http://en.wikipedia.org/wiki/ | + | |
| - | )] | + | |
| + | ==== References ==== | ||
| + | ((: | ||
| + | |||
| + | ((:cite: | ||
| - | [(Rayes(2017)>> | + | < |
| - | | authors | + | |
| - | | title = Internet of Things-From Hype to Reality, | + | |
| - | | publisher = Springer Nature | + | |
| - | | published = 2017 | + | |
| - | )] | + | |