Читать книгу Industrial Internet of Things (IIoT) - Группа авторов - Страница 35
2.3.2.2 Access Layer
ОглавлениеEavesdropping, dishonest packets injections, and conversations that are not authorized are some of the major weaknesses. Based on the routing assaults, an assailant can try spoofing, redirecting, misdirecting, or drop packets.