Читать книгу Industrial Internet of Things (IIoT) - Группа авторов - Страница 50

2.5.2 Gateways and Networking Devices

Оглавление

For transmitting data to the destination through gateways and networking devices, wireless protocols are utilized by the gateway to communicate, and then the assailant can link to the gateway via wireless assaults. Some of the attacks listed below.

 i. Injection attack: In the communication procedure, assailants use weakness and pervade the data into network. While protocol is verifying data integrity, assailant can alter data injected and obtain overall control from the system [36].

 ii. Man-in-the-middle attack: It scouts the traffic streaming between the device and the gateways. If the assailant is unable to perceive the outgoing traffic, then this attack can be stopped. Accordingly, the employment of encryption in the convention is essential [29, 37].

 iii. DNS poisoning: Whenever the assailant can damage the records belonging to DNS from the corresponding server, any information across devices get transferred across goal planned. Then, malign servers fetch the info from the units [38].

 iv. Replay assaults: In this assault, the assailant surveys and saves replica of the traffic for later use. Afterward, devices can be accessed by operating on recently discoursed traffic. The approved traffic data is consumed over and over in an alternate background [39].

 v. Wormhole attack: Wormhole attack will generate issues and cause overcrowding in the network in order to direct data from one place to another and form heavy traffic [40].

Industrial Internet of Things (IIoT)

Подняться наверх