Table 2.
Common Attacks in IoT-MEC.
Source | Attacks | Mode of Attack Initiation |
---|---|---|
[38,39,40] | Spoofing | Impersonation |
[41,42,43] | Denial of Service (DoS) | Network Flooding |
[44,45,46] | Distributed Denial-of-Service (DDoS) | Network Flooding |
[47,48] | Jamming | Fake Signaling |
[49,50] | Man-In-the-Middle | Eavesdropping Packets |
[51,52] | Privacy Leakage | Attack Authentication Storage |
[53,54] | Marai Botnet Attack | Malware Implant on Devices |
[55,56] | Sybil Attack | Creates Anonymous Identities |
[57,58] | AI-Based Attacks | Creates AI-powered Tools |