IoT Flashcards
What are the three forms of RPL Attacks?
Resources, Topology, Traffic
What are the two types of Resources Attack?
Direct & Indirect
What are two forms of direct attack?
Flooding & Routing Table Overload
What are three forms of indirect attacks?
Increased Rank Attack, DAG Consistency, Version Number Modification
What are the two types of Topology Attack?
Suboptimization, Isolation
What are the five Suboptimization attack?
Routing Table Falsification, Sinkhole, Wormhole, Worst Parent, RI Replay
What are the two Isolation attack?
Blackhole, DAO Inconsistency
What are the two types of traffic attack?
Eavesdropping and Misappropriation
What is an example of eavesdropping?
Sniffing & Traffic Analysis
What is an example of misappropriation?
Decreased Rank & Identity Attack