1. signals to get access for read and


    Denial-of-ServiceAttackDenial-of-Service (DoS) is one of the most common attack. In DoS the attacker makes thesystem inaccessible to legitimate user by jamming the network using bogustraffic. It can occur in multiple layer of WSN.  In physical layer it can be happened by nodejamming and tampering attack. Where as in network layer the attack can be blackhole, hello flood attack. At transport layer 2 it can be performed by floodingattack.  2.

We Will Write a Custom Essay Specifically
For You For Only $13.90/page!

order now

    Man-In-TheMiddle AttackForthis attack the attacker need to be physically close to the IoT system. Attackercan be violating the privacy by accessing and restricted data and interfering betweentwo sensors. The interfering can be done by data monitoring, snooping and controllingthe communication between the two sensor nodes.

3.    SocialEngineering AttackTheattacker convinces the user of IoT system, to extract the confidentialinformation or to perform certain action to achieve their goal.  Like the man-in-middle attack for this attackthe attacker need to be physically close to do the attack.4.    RFIDSpoofing and CloningAnattacker spoofs a RFID signals to get access for read and record thetransmitted data from a RFID tag. RFID cloning means copying data from one RFIDvictim tag to another RFID tag.

Though two RFID tag contain same data, but thismethod cannot replicate the original id of RFID. 5.    RFIDUnauthorized AccessDue to the lack of authenticationmechanism most of the RFID systems can be accessible to attackers. And attackercan read, modify and even delete information from nodes through this attack. 6.

    SinkholeAttackSinkholeattack may breach the confidentiality of data and denies services by droppingall the packet instead of forwarding them to the destination. This attack attractsmaximum number of traffic through a malicious node. If the sensor network hasone base station, then this attack can be very dangerous. 7.    SybilAttackIn Sybil attack a single node is claimthe identities of many nodes and may mislead other nodes of the network. 8.    PhishingAttackThe attacker gets the access of confidentialdata by spoofing the authentication credential of a user through phishing websitesor infected emails.

9.     Virus, Worm, Trojan, SpywareAnattacker can infect the system by using malicious software or by the maliciousactivity and can steal information, modify them or denial of services. 10.  Cryptoanalysis AttackAttackerguess the ciphertext or plaintext in this attack and try their level best tofind out the encryption key to break the security scheme and get theinformation. In IoT the example of cryptosystem attack can be known-plaintextattack, chosen-plaintext attack, chosen-ciphertext attack and ciphertext-onlyattack. 


I'm Mary!

Would you like to get a custom essay? How about receiving a customized one?

Check it out