Главная » Industrial Internet of Things (IIoT). Intelligent Analytics for Predictive Maintenance читать онлайн | страница 94

Читать книгу Industrial Internet of Things (IIoT). Intelligent Analytics for Predictive Maintenance онлайн

94 страница из 122

 iii. BlueBorne attack: This attack occurs when communication medium is Bluetooth-it is employed by smart TV, printer and washing machine etc. There is likelihood to hold this attack even as Bluetooth is incapable to pair up with any further devices. Once misused, the assailants can achieve whatever the task assigned [34].

 iv. Sybil (related to sensor networks) attacks: Fake devices can be used to create chaos in the system and the device performance gets weakened. Any harmful node can perform this assault by communicating over diverse personalities creating chaos [35].

2.5.2 Gateways and Networking Devices

For transmitting data to the destination through gateways and networking devices, wireless protocols are utilized by the gateway to communicate, and then the assailant can link to the gateway via wireless assaults. Some of the attacks listed below.

 i. Injection attack: In the communication procedure, assailants use weakness and pervade the data into network. While protocol is verifying data integrity, assailant can alter data injected and obtain overall control from the system [36].

Правообладателям