Читать книгу Industrial Internet of Things (IIoT) - Группа авторов - Страница 49
2.5.1 Devices of IoT
ОглавлениеDevices of IoT are used to obtain data from its domain with the aid of internet connection. Some of the assaults scheduled and discussed below.
i. Brute force attack: The main objective of the attacker is to get authentication credentials of the smart device by employing guessing mechanism. When some of the devices have login credentials that are default and the assailant is aware about it, then he can easily get those devices’ sensitive information using default password set obtainable on the web. In IoT devices, botnet attack reasons for such susceptibility [32].
ii. Buffer overflow attack: It happens owing to uninformed faults during coding leading to this attack [33].
iii. BlueBorne attack: This attack occurs when communication medium is Bluetooth-it is employed by smart TV, printer and washing machine etc. There is likelihood to hold this attack even as Bluetooth is incapable to pair up with any further devices. Once misused, the assailants can achieve whatever the task assigned [34].
iv. Sybil (related to sensor networks) attacks: Fake devices can be used to create chaos in the system and the device performance gets weakened. Any harmful node can perform this assault by communicating over diverse personalities creating chaos [35].