Skip to main content
. 2022 May 14;22(10):3744. doi: 10.3390/s22103744

Table 2.

Common Attacks in IoT-MEC.

Source Attacks Mode of Attack Initiation
[38,39,40] Spoofing Impersonation
[41,42,43] Denial of Service (DoS) Network Flooding
[44,45,46] Distributed Denial-of-Service (DDoS) Network Flooding
[47,48] Jamming Fake Signaling
[49,50] Man-In-the-Middle Eavesdropping Packets
[51,52] Privacy Leakage Attack Authentication Storage
[53,54] Marai Botnet Attack Malware Implant on Devices
[55,56] Sybil Attack Creates Anonymous Identities
[57,58] AI-Based Attacks Creates AI-powered Tools