Posts

Showing posts from January 23, 2023

Security threats for Internet of Things

  ATTACKS IN IOT: 1. Black Hole Attack : In this, the attacker node publicizes itself for having the shortest route to any desired node in the network. Gray Hole Attack : It is a special case of Black hole attack by dropping a few packets with a set of probability Rushing Attack : A malicious node rising the speed (Rush) of the routing process. . It accepts the Route Request packet and forwards to its neighbours sooner as compared to others. Wormhole Attack : Wormhole attack catches the packet from one location; send it over the tunnel to the other location. Sybil Attack : In this attacker node controls multiple identities by assuming arbitrary identities or may spoof legitimate nodes. SECURITY COUNTER MEASURES IN IOT:  A) Cryptography (Hard security): Cryptography is just an art of hiding information. It works as an important security tool to provide authentication, confidentiality and other services. B) Trust evaluation (Soft Security): Various cryptographic algorithms are propose