1. signals to get access for read and

Published by admin on

1.    
Denial-of-Service
Attack

Denial-of
-Service (DoS) is one of the most common attack. In DoS the attacker makes the
system inaccessible to legitimate user by jamming the network using bogus
traffic. It can occur in multiple layer of WSN.  In physical layer it can be happened by node
jamming and tampering attack. Where as in network layer the attack can be black
hole, hello flood attack. At transport layer 2 it can be performed by flooding
attack.  

2.    
Man-In-The
Middle Attack

We Will Write a Custom Essay Specifically
For You For Only $13.90/page!


order now

For
this attack the attacker need to be physically close to the IoT system. Attacker
can be violating the privacy by accessing and restricted data and interfering between
two sensors. The interfering can be done by data monitoring, snooping and controlling
the communication between the two sensor nodes.

3.    
Social
Engineering Attack

The
attacker convinces the user of IoT system, to extract the confidential
information or to perform certain action to achieve their goal.  Like the man-in-middle attack for this attack
the attacker need to be physically close to do the attack.

4.    
RFID
Spoofing and Cloning

An
attacker spoofs a RFID signals to get access for read and record the
transmitted data from a RFID tag. RFID cloning means copying data from one RFID
victim tag to another RFID tag. Though two RFID tag contain same data, but this
method cannot replicate the original id of RFID.

5.    
RFID
Unauthorized Access

Due to the lack of authentication
mechanism most of the RFID systems can be accessible to attackers. And attacker
can read, modify and even delete information from nodes through this attack.

6.    
Sinkhole
Attack

Sinkhole
attack may breach the confidentiality of data and denies services by dropping
all the packet instead of forwarding them to the destination. This attack attracts
maximum number of traffic through a malicious node. If the sensor network has
one base station, then this attack can be very dangerous.

7.    
Sybil
Attack

In Sybil attack a single node is claim
the identities of many nodes and may mislead other nodes of the network.

8.    
Phishing
Attack

The attacker gets the access of confidential
data by spoofing the authentication credential of a user through phishing websites
or infected emails.

9.     Virus, Worm, Trojan, Spyware

An
attacker can infect the system by using malicious software or by the malicious
activity and can steal information, modify them or denial of services.

10.  Cryptoanalysis Attack

Attacker
guess the ciphertext or plaintext in this attack and try their level best to
find out the encryption key to break the security scheme and get the
information. In IoT the example of cryptosystem attack can be known-plaintext
attack, chosen-plaintext attack, chosen-ciphertext attack and ciphertext-only
attack. 

Categories: Data

x

Hi!
I'm Iren!

Would you like to get a custom essay? How about receiving a customized one?

Check it out