Classification | Security Attacks | Security Impacts |
Physical Attacks | Node tempering, Side channel analysis, Radio frequency jamming | These attacks will enable hackers to modify a node or sensor data and physically harm the hardware of IoT |
Network Attacks | Traffic analysis attack, Selective forwarding, Sybil attack, Sinkhole attack, Botnet attack, Hello-flood attack, Man in the middle attack | These attacks will allow hackers to have remote access and send wrong instructions to take control of IoT devices |
Application Attacks | Code injection, Buffer overflow, SQL injection, Session Hijacking, Authentication and Authorization attacks | These attacks will enable hackers to steal sensitive data by providing unauthorized access to the application level of IoT |
Zigbee Attacks | Eavesdropping attack, Replay attack, Packet forging attacks | These attacks will enable hackers to capture the sensitive information and Zigbee traffic |
Z-Wave Attacks | Z-Wave downgrade attack, Z-Wave injection attack, Z-Wave Man in the middle attack | These attacks will allow hackers to execute security attacks against Z-Wave devices |