Classification

Security Attacks

Security Impacts

Physical Attacks

Node tempering, Side channel analysis, Radio frequency jamming

These attacks will enable hackers to modify a node or sensor data and physically harm the hardware of IoT

Network Attacks

Traffic analysis attack, Selective forwarding, Sybil attack, Sinkhole attack, Botnet attack, Hello-flood attack, Man in the middle attack

These attacks will allow hackers to have remote access and send wrong instructions to take control of IoT devices

Application Attacks

Code injection, Buffer overflow, SQL injection, Session Hijacking, Authentication and Authorization attacks

These attacks will enable hackers to steal sensitive data by providing unauthorized access to the application level of IoT

Zigbee Attacks

Eavesdropping attack, Replay attack, Packet forging attacks

These attacks will enable hackers to capture the sensitive information and Zigbee traffic

Z-Wave Attacks

Z-Wave downgrade attack, Z-Wave injection attack, Z-Wave Man in the middle attack

These attacks will allow hackers to execute security attacks against Z-Wave devices