Research Article

A Consensus Framework for Reliability and Mitigation of Zero-Day Attacks in IoT

Table 3

Zero-day attacks in IoT.

Attack techniques Mechanism Focus Methodology

Asynchronous attack [56] Lead to instability of a real-time energy market Erroneous control Desynchronizing of smart meters
Simple packet delay attack [56] Desynchronizing the slave nodes Manipulate of a slaves’ clock Delay of the transmissions of the NTP or PTP packets
DDoS [57, 58] Denial of services, service unavailable Unknown or new attack, exploiting vulnerabilities, overload resources UDP flood, ICMP/PING flood, SYN flood, Ping of Death, etc.
Advanced persistent threats (APT) [58] Unauthorized person attempts to gain access to the system Stealing data Bypassing authentication
Man-in-the-Middle (MITM) attack [5860] Gain illegitimate access to the system or the network A program or person masquerades as another program or person Spoofing and sniffing attack
Replay attack [58, 61, 62] Disguise valid entities or messages Bypassing integrity Valid message containing some valid data is repeated again and again