This is an old revision of the document!
IoT Hardware and Cybersecurity
IoT hardware attacks
Eavesdropping and man-in-the-middle attacks: Data exchange should be performed securely, making data interception by a third party impossible. Traditional data encryption schemes cannot be implemented in IoT devices, requiring lightweight encryption, which is not straightforward and is sometimes ignored by manufacturers. Transmitting unencrypted IoT data, including security data, makes IoT networks susceptible to eavesdropping and man-in-the-middle attacks.
Energy depletion attacks: In this kind of attack, an attacker tries to increase the energy consumption of a battery-powered IoT device significantly, drain the device's battery, and eventually shut down the device. Examples of such attacks include Denial of Sleep (DoS), flooding, a carousel, and stretch attacks .
Vampire attacks: Similar to energy depletion attacks, an attacker attempts to increase the energy consumption of a battery-powered IoT device, drain the device's battery, and eventually shut down the device. Examples include Denial of Sleep (DoS), flooding, a carousel, and stretch attacks .
Routing attacks: An attacker may manipulate the routing information of the devices to create routing loops, selectively forward packets, or intend to use longer routes to increase energy consumption. Some routing attacks include sinkholes, selective forwarding, wormholes, and Sybil attacks .
References