Читать книгу Industrial Internet of Things (IIoT). Intelligent Analytics for Predictive Maintenance онлайн
95 страница из 122
ii. Man-in-the-middle attack: It scouts the traffic streaming between the device and the gateways. If the assailant is unable to perceive the outgoing traffic, then this attack can be stopped. Accordingly, the employment of encryption in the convention is essential [29, 37].
iii. DNS poisoning: Whenever the assailant can damage the records belonging to DNS from the corresponding server, any information across devices get transferred across goal planned. Then, malign servers fetch the info from the units [38].
iv. Replay assaults: In this assault, the assailant surveys and saves replica of the traffic for later use. Afterward, devices can be accessed by operating on recently discoursed traffic. The approved traffic data is consumed over and over in an alternate background [39].
v. Wormhole attack: Wormhole attack will generate issues and cause overcrowding in the network in order to direct data from one place to another and form heavy traffic [40].