Skip to main content
. 2022 Sep 30;22(19):7433. doi: 10.3390/s22197433

Table 6.

Physical attacks with compromised security goals and countermeasures.

Physical Attacks Compromised Security Requirements Effects Countermeasures
Node Jamming ALL Communication disruption, Reducing lifetime [99] Frequency hopping [100], Game theory [99], Spread Spectrum, lower duty cycle, priority messages, region mapping
Physical Damage ALL Hardware control, Confidential information leakage [101] Secure physical design, tamper proof and self-destruction
Node Tampering ALL Device ID impersonation [102], Access to sensitive data and Gain access, DoS Cloning resistance and self-destruction, lowering information leakage (adding randomized delay, deliberately generated noise, balancing hamming weights, strengthening the cache architecture, shielding), integrating Physically Unclonable Function (PUF) in the device [102]
Social Engineering ALL Control sensors [103] Cloud-edge processing and feedback [104], Back up techniques, education of IoT users, tamper proofing and self-destruction
Malicious Node Injection ALL Illegal surveillance [102], Control data flow; Man in the Middle Data compression algorithm [105], Calculation of path credibility [106], Secure firmware update, hash-based mechanisms, Encryption, authentication technique
Sleep Deprivation Attack I, A, NP Node shutdown Intrusion Detection system [63], Firefly algorithm and Hopfield neural network [107], Radial bias function [108]
Malicious Code Injection ALL Loss of software integrity, Access to sensitive information and Gain access, DoS Chain of trust, API endpoint security [102], Traffic monitoring and detection scheme [109], Tamper protection and self-destruction, IDS
RF Interference ALL Message block [91], DoS Distance-based information, Secure kill command for tags, Electronic Product Code (EPC) tags [63], spread-spectrum communication [110], Anti-jamming beamforming scheme [91]
Tag Cloning ALL Unauthorized copy of tag Attack probability scheme [111], Tag randomization [112], Encryption, hash-based methods, authentication framework, kill sleep instruction, isolation, blocking, distance estimation, Integrating PUFs into RFID tags
Eavesdropping C, NR, P Extract critical network information [102] Secure Bootstrapping [63], low-cost demilitarized zone [102], Encryption techniques, shift data to the back end
Tag Tampering ALL Malicious altercation of data in tag memory [113] Authentication watermark and recovery Watermark [114], Integration of PUFs into RFID tags, hash-based mechanisms, encryption, tamper-release layer RFID, integrating alarm option for active Tags
Outage attack A, AC, P, AU, NP Disrupt or bias the state of applications [115] Random time hopping sequence and random permutation [115], Secure physical design
Object replication ALL Control network [116] 3-D backward key chains based on deployment knowledge [117], Encryption, Hash-based methods, Lightweight cartographic schemes
Hardware Trojan ALL Function change of chips and sensitive information leakage [118] Temporal thermal information [118], Electromagnetic radiation [119], Side-channel signal assessment (based on path-delay fingerprint, based on symmetry breaking, based on thermal and power, machine learning application), trojan activation