IoT Flashcards

1
Q

What are the three forms of RPL Attacks?

A

Resources, Topology, Traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the two types of Resources Attack?

A

Direct & Indirect

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are two forms of direct attack?

A

Flooding & Routing Table Overload

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are three forms of indirect attacks?

A

Increased Rank Attack, DAG Consistency, Version Number Modification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the two types of Topology Attack?

A

Suboptimization, Isolation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the five Suboptimization attack?

A

Routing Table Falsification, Sinkhole, Wormhole, Worst Parent, RI Replay

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the two Isolation attack?

A

Blackhole, DAO Inconsistency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the two types of traffic attack?

A

Eavesdropping and Misappropriation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is an example of eavesdropping?

A

Sniffing & Traffic Analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is an example of misappropriation?

A

Decreased Rank & Identity Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly