Table 5.
IoMT most common cyber attacks.
Attack | Attack vector | Reference |
---|---|---|
DoS attacks | Cloud Services, Databases | Rathore et al. (2019); Sun et al. (2019); Yaacoub et al. (2020); Yaqoob et al. (2019) |
Injection attacks | Databases | Hao et al. (2011); Bostami et al., (2019) |
Data leakage | Messages, Network | Kaushik et al. (2019); Sun et al. (2019); Yaqoob et al. (2019); Sengupta et al. (2019) |
Device safety | Hardware, Middleware | Hassan et al. (2019); Yaacoub et al. (2020); Yaqoob et al. (2019); Sengupta et al. (2019) |