IoT Security
by Nur Azaliah Abu Bakar
1. Network Attacks
1.1. DOS/DDoS
1.1.1. Packet Flooding
1.1.2. Botnet
1.1.3. Slowloris
1.1.4. Jamming Attack
1.2. Encryption Attacks
1.2.1. Man-in-the-Middle
1.2.2. Spoofing Attack
1.2.3. Session Hijacking
1.2.4. Packet Manipulation
1.2.5. RFID Cloning
1.3. Routing Attacks
1.3.1. Sybil Attack
1.3.2. Wormhole/Sinkhole
1.3.3. Forwarding Attack
1.4. Middleware Attacks
1.4.1. Brute Force
1.4.2. Signature Attack
1.4.3. Dictionary Attack
2. Physical Attacks
2.1. Eavesdropping
2.2. Spoofing & Sybil Attack
2.3. Radio Jamming
2.4. Node Capturing
2.5. Node Outage
2.6. Access Control Attack
2.7. Physical destruction
2.8. Disconnection of Physical Links
3. Application Attacks
3.1. Malware
3.1.1. Virus
3.1.2. Ransomware
3.1.3. Spyware
3.1.4. Trojan Horse
3.2. Privacy Attacks
3.2.1. Phishing
3.2.2. Social Engineering
3.2.3. Impersonation
3.2.4. Whaling
3.3. Code Attacks
3.3.1. SQL Injection
3.3.2. Cross Site Scripting
3.3.3. Malicious Script
3.3.4. Logic Bomb