-Service (DoS) is one of the most common attack. In DoS the attacker makes the
system inaccessible to legitimate user by jamming the network using bogus
traffic. It can occur in multiple layer of WSN. In physical layer it can be happened by node
jamming and tampering attack. Where as in network layer the attack can be black
hole, hello flood attack. At transport layer 2 it can be performed by flooding
this attack the attacker need to be physically close to the IoT system. Attacker
can be violating the privacy by accessing and restricted data and interfering between
two sensors. The interfering can be done by data monitoring, snooping and controlling
the communication between the two sensor nodes.
attacker convinces the user of IoT system, to extract the confidential
information or to perform certain action to achieve their goal. Like the man-in-middle attack for this attack
the attacker need to be physically close to do the attack.
Spoofing and Cloning
attacker spoofs a RFID signals to get access for read and record the
transmitted data from a RFID tag. RFID cloning means copying data from one RFID
victim tag to another RFID tag. Though two RFID tag contain same data, but this
method cannot replicate the original id of RFID.
Due to the lack of authentication
mechanism most of the RFID systems can be accessible to attackers. And attacker
can read, modify and even delete information from nodes through this attack.
attack may breach the confidentiality of data and denies services by dropping
all the packet instead of forwarding them to the destination. This attack attracts
maximum number of traffic through a malicious node. If the sensor network has
one base station, then this attack can be very dangerous.
In Sybil attack a single node is claim
the identities of many nodes and may mislead other nodes of the network.
The attacker gets the access of confidential
data by spoofing the authentication credential of a user through phishing websites
or infected emails.
9. Virus, Worm, Trojan, Spyware
attacker can infect the system by using malicious software or by the malicious
activity and can steal information, modify them or denial of services.
10. Cryptoanalysis Attack
guess the ciphertext or plaintext in this attack and try their level best to
find out the encryption key to break the security scheme and get the
information. In IoT the example of cryptosystem attack can be known-plaintext
attack, chosen-plaintext attack, chosen-ciphertext attack and ciphertext-only