Главная » Industrial Internet of Things (IIoT). Intelligent Analytics for Predictive Maintenance читать онлайн | страница 93

Читать книгу Industrial Internet of Things (IIoT). Intelligent Analytics for Predictive Maintenance онлайн

93 страница из 122

In the IoT network, every smart device is connected with the web, they indirectly getting the weaknesses of such structure like DDoS, replay assaults, eavesdropping, and web-application threats [31]. Consequently, assaults are classified into three sorts on the basis of the IoT infrastructure and registered here.

2.5.1 Devices of IoT

Devices of IoT are used to obtain data from its domain with the aid of internet connection. Some of the assaults scheduled and discussed below.

 i. Brute force attack: The main objective of the attacker is to get authentication credentials of the smart device by employing guessing mechanism. When some of the devices have login credentials that are default and the assailant is aware about it, then he can easily get those devices’ sensitive information using default password set obtainable on the web. In IoT devices, botnet attack reasons for such susceptibility [32].

 ii. Buffer overflow attack: It happens owing to uninformed faults during coding leading to this attack [33].

Правообладателям