Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
en:iot-reloaded:hardware_and_cybersecurity:test [2025/05/14 14:45] – [IoT hardware attacks] raivo.sellen:iot-reloaded:hardware_and_cybersecurity:test [2025/05/14 18:08] (current) – old revision restored (2025/05/14 18:01) raivo.sell
Line 1: Line 1:
 ====== IoT Hardware and Cybersecurity ====== ====== IoT Hardware and Cybersecurity ======
  
-====== IoT Hardware and Cybersecurity ======+===== IoT hardware attacks =====
  
-====== IoT Hardware and Cybersecurity ======+  * **Energy depletion attacks:** In this  ((:cite:rayes)).
  
-====== IoT Hardware and Cybersecurity ======+  * **Vampire attacks:** Similar ((:cite:rayes)).
  
-===== IoT hardware attacks =====+  * **Routing attacks:** An attacker and Sybil attacks ((:cite:rayes)).
  
-  * **Eavesdropping and man-in-the-middle attacks:** Data exchange should be performed securely, making data interception by a third party impossibleTraditional data encryption schemes cannot be implemented in IoT devices, requiring lightweight encryption, which is not straightforward and is sometimes ignored by manufacturers. Transmitting unencrypted IoT data, including security data, makes IoT networks susceptible to eavesdropping and man-in-the-middle attacks+  * **Jamming attacks:** channel ((:cite:yanqiang))It is an attack targeting the IoT wireless network's physical or data link layer.
  
-  * **Energy depletion attacks:** In this kind of attack, an attacker tries to increase the energy consumption of a battery-powered IoT device significantly, drain the device's battery, and eventually shut down the device. Examples of such attacks include Denial of Sleep (DoS), flooding, a carousel, and stretch attacks <ref id="rayes" />. 
  
-  * **Vampire attacks:** Similar to energy depletion attacks, an attacker attempts to increase the energy consumption of a battery-powered IoT device, drain the device's battery, and eventually shut down the device. Examples include Denial of Sleep (DoS), flooding, a carousel, and stretch attacks <ref id="rayes" />. 
  
-  * **Routing attacks:** An attacker may manipulate the routing information of the devices to create routing loops, selectively forward packetsor intend to use longer routes to increase energy consumptionSome routing attacks include sinkholesselective forwarding, wormholes, and Sybil attacks <ref id="rayes/>.+==== References ==== 
 +((:cite:rayes>RayesA.; SalamS. "Internet of Things-From Hype to Reality", Springer, 2017))
  
-  * **Jamming attacks:** A denial of service attack in a shared wireless communication channel where a user may prevent other users from using the shared channel <ref id="yanqiang" />It is an attack targeting the IoT wireless network's physical or data link layer.+((:cite:yanqiang>Yan-Qiang, S.; Xiao-dong, W. "Handbook of Research on Developments and Trends in Wireless Sensor Networks: From Principle to Practice", IGI Global, 2010, DOI: 10.4018/978-1-61520-701-5.ch015))
  
 <references /> <references />
- 
-<ref id="rayes">Rayes, A.; Salam, S. "Internet of Things-From Hype to Reality", Springer, 2017</ref> 
-<ref id="yanqiang">Yan-Qiang, S.; Xiao-dong, W. "Handbook of Research on Developments and Trends in Wireless Sensor Networks: From Principle to Practice", IGI Global, 2010, DOI: 10.4018/978-1-61520-701-5.ch015</ref> 
- 
- 
en/iot-reloaded/hardware_and_cybersecurity/test.1747233906.txt.gz · Last modified: 2025/05/14 14:45 by raivo.sell
CC Attribution-Share Alike 4.0 International
www.chimeric.de Valid CSS Driven by DokuWiki do yourself a favour and use a real browser - get firefox!! Recent changes RSS feed Valid XHTML 1.0