Research Article
Investigating Brute Force Attack Patterns in IoT Network
Table 1
List of equipment for the testbed.
| Name | IP address | Description |
| Node 1 | 192.178.10.3 | DHT22 sensor | Node 2 | 192.178.10.4 | Soil moisture sensor | Node 3 | 192.178.10.5 | MQ2 sensor | Node 4 | 192.178.10.6 | Water level sensor | Node 5 | Pan-ID: 2017 | Zigbee sensor | Node 6 | Pan-ID: 2018 | Zigbee sensor | Middleware 1 | 192.178.10.7 | Raspberry Pi | Middleware 1 | 192.178.10.8 | Raspberry Pi | User | 192.168.10.10 | Laptop as sniffer | Attacker | 192.168.10.11 | Laptop as sniffer (using Wi-Fi) | Attacker | 192.168.10.30 | Laptop as sniffer (using Wi-Fi) | Server | 192.168.10.2 | Monitoring and FTP server, as well as sniffer | XBee attacker | ā | Laptop (using XBee) | Router | ā | Wireless router |
|
|