Table 2.
Common Attacks in IoT-MEC.
| Source | Attacks | Mode of Attack Initiation |
|---|---|---|
| [38,39,40] | Spoofing | Impersonation |
| [41,42,43] | Denial of Service (DoS) | Network Flooding |
| [44,45,46] | Distributed Denial-of-Service (DDoS) | Network Flooding |
| [47,48] | Jamming | Fake Signaling |
| [49,50] | Man-In-the-Middle | Eavesdropping Packets |
| [51,52] | Privacy Leakage | Attack Authentication Storage |
| [53,54] | Marai Botnet Attack | Malware Implant on Devices |
| [55,56] | Sybil Attack | Creates Anonymous Identities |
| [57,58] | AI-Based Attacks | Creates AI-powered Tools |