Table 6.
Physical attacks with compromised security goals and countermeasures.
Physical Attacks | Compromised Security Requirements | Effects | Countermeasures |
---|---|---|---|
Node Jamming | ALL | Communication disruption, Reducing lifetime [99] | Frequency hopping [100], Game theory [99], Spread Spectrum, lower duty cycle, priority messages, region mapping |
Physical Damage | ALL | Hardware control, Confidential information leakage [101] | Secure physical design, tamper proof and self-destruction |
Node Tampering | ALL | Device ID impersonation [102], Access to sensitive data and Gain access, DoS | Cloning resistance and self-destruction, lowering information leakage (adding randomized delay, deliberately generated noise, balancing hamming weights, strengthening the cache architecture, shielding), integrating Physically Unclonable Function (PUF) in the device [102] |
Social Engineering | ALL | Control sensors [103] | Cloud-edge processing and feedback [104], Back up techniques, education of IoT users, tamper proofing and self-destruction |
Malicious Node Injection | ALL | Illegal surveillance [102], Control data flow; Man in the Middle | Data compression algorithm [105], Calculation of path credibility [106], Secure firmware update, hash-based mechanisms, Encryption, authentication technique |
Sleep Deprivation Attack | I, A, NP | Node shutdown | Intrusion Detection system [63], Firefly algorithm and Hopfield neural network [107], Radial bias function [108] |
Malicious Code Injection | ALL | Loss of software integrity, Access to sensitive information and Gain access, DoS | Chain of trust, API endpoint security [102], Traffic monitoring and detection scheme [109], Tamper protection and self-destruction, IDS |
RF Interference | ALL | Message block [91], DoS | Distance-based information, Secure kill command for tags, Electronic Product Code (EPC) tags [63], spread-spectrum communication [110], Anti-jamming beamforming scheme [91] |
Tag Cloning | ALL | Unauthorized copy of tag | Attack probability scheme [111], Tag randomization [112], Encryption, hash-based methods, authentication framework, kill sleep instruction, isolation, blocking, distance estimation, Integrating PUFs into RFID tags |
Eavesdropping | C, NR, P | Extract critical network information [102] | Secure Bootstrapping [63], low-cost demilitarized zone [102], Encryption techniques, shift data to the back end |
Tag Tampering | ALL | Malicious altercation of data in tag memory [113] | Authentication watermark and recovery Watermark [114], Integration of PUFs into RFID tags, hash-based mechanisms, encryption, tamper-release layer RFID, integrating alarm option for active Tags |
Outage attack | A, AC, P, AU, NP | Disrupt or bias the state of applications [115] | Random time hopping sequence and random permutation [115], Secure physical design |
Object replication | ALL | Control network [116] | 3-D backward key chains based on deployment knowledge [117], Encryption, Hash-based methods, Lightweight cartographic schemes |
Hardware Trojan | ALL | Function change of chips and sensitive information leakage [118] | Temporal thermal information [118], Electromagnetic radiation [119], Side-channel signal assessment (based on path-delay fingerprint, based on symmetry breaking, based on thermal and power, machine learning application), trojan activation |