This is an old revision of the document!


IoT Hardware and Cybersecurity

IoT hardware attacks

  • Energy depletion attacks: In this 1).
  • Vampire attacks: Similar 2).
  • Routing attacks: An attacker and Sybil attacks 3).
  • Jamming attacks: channel 4). It is an attack targeting the IoT wireless network's physical or data link layer.

References

<references />


1), 2), 3) Rayes, A.; Salam, S. “Internet of Things-From Hype to Reality”, Springer, 2017
4) Yan-Qiang, S.; Xiao-dong, W. “Handbook of Research on Developments and Trends in Wireless Sensor Networks: From Principle to Practice”, IGI Global, 2010, DOI: 10.4018/978-1-61520-701-5.ch015
en/iot-reloaded/hardware_and_cybersecurity/test.1747245945.txt.gz · Last modified: 2025/05/14 18:05 by raivo.sell
CC Attribution-Share Alike 4.0 International
www.chimeric.de Valid CSS Driven by DokuWiki do yourself a favour and use a real browser - get firefox!! Recent changes RSS feed Valid XHTML 1.0