Classification of IoT attacks

Get Started. It's Free
or sign up with your email address
Rocket clouds
Classification of IoT attacks by Mind Map: Classification of IoT attacks

1. Researcher Andrea

1.1. Physical

1.1.1. Attacks

1.1.1.1. Attacker is close distance of the device.

1.1.2. Solution

1.1.2.1. Use secure booting by application of cryptographic hash algorithms and digital signature to verify authentication and integrity of software

1.1.2.2. Additional solution is to carry an error detection system and having all information encrypted.

1.2. Network

1.2.1. Attacks

1.2.1.1. Manipulating IoT network system to create damage

1.2.2. Solution

1.2.2.1. Authentication mechanisms and point-t0-point encryption to be ensure data privacy and rooting security.

1.3. Software

1.3.1. Attacks

1.3.1.1. When IoT applications present security vulnerabilities, allows attacker to seize the opportunity and harm the system.

1.3.2. Solution

1.3.2.1. Means of authentication,encryption and integrity verification allowing authorized users to access data through control lists and firewalls.

1.4. Encryption

1.4.1. Attacks

1.4.1.1. By breaking the system encryption