Get Started. It's Free
or sign up with your email address
IoT Security by Mind Map: IoT Security

1. Physical Attacks

1.1. Eavesdropping

1.2. Spoofing & Sybil Attack

1.3. Radio Jamming

1.4. Node Capturing

1.5. Node Outage

1.6. Access Control Attack

1.7. Physical destruction

1.8. Disconnection of Physical Links

2. Network Attacks

2.1. DOS/DDoS

2.1.1. Packet Flooding

2.1.2. Botnet

2.1.3. Slowloris

2.1.4. Jamming Attack

2.2. Encryption Attacks

2.2.1. Man-in-the-Middle

2.2.2. Spoofing Attack

2.2.3. Session Hijacking

2.2.4. Packet Manipulation

2.2.5. RFID Cloning

2.3. Routing Attacks

2.3.1. Sybil Attack

2.3.2. Wormhole/Sinkhole

2.3.3. Forwarding Attack

2.4. Middleware Attacks

2.4.1. Brute Force

2.4.2. Signature Attack

2.4.3. Dictionary Attack

3. Application Attacks

3.1. Malware

3.1.1. Virus

3.1.2. Ransomware

3.1.3. Spyware

3.1.4. Trojan Horse

3.2. Privacy Attacks

3.2.1. Phishing

3.2.2. Social Engineering

3.2.3. Impersonation

3.2.4. Whaling

3.3. Code Attacks

3.3.1. SQL Injection

3.3.2. Cross Site Scripting

3.3.3. Malicious Script

3.3.4. Logic Bomb