This is an old revision of the document!


IoT Hardware and Cybersecurity

IoT hardware attacks

  • Energy depletion attacks: In this [1].
  • Vampire attacks: Similar [1].
  • Routing attacks: An attacker and Sybil attacks [1].
  • Jamming attacks: channel [2]. It is an attack targeting the IoT wireless network's physical or data link layer.

References


[1], [1], [1] Rayes, A.; Salam, S. “Internet of Things-From Hype to Reality”, Springer, 2017
[2] Yan-Qiang, S.; Xiao-dong, W. “Handbook of Research on Developments and Trends in Wireless Sensor Networks: From Principle to Practice”, IGI Global, 2010, DOI: 10.4018/978-1-61520-701-5.ch015
en/iot-reloaded/hardware_and_cybersecurity/test.1747244777.txt.gz · Last modified: 2025/05/14 17:46 by raivo.sell
CC Attribution-Share Alike 4.0 International
www.chimeric.de Valid CSS Driven by DokuWiki do yourself a favour and use a real browser - get firefox!! Recent changes RSS feed Valid XHTML 1.0