Research Article

[Retracted] Machine-to-Machine Communication for Device Identification and Classification in Secure Telerobotics Surgery

Table 1

Attacks in IoT and telerobotic surgery.

Type of attacksInvestigation scenarios

Replay attackThe enemy will play a legitimate message/command illegally later
EavesdroppingAttackers passively enter conversations and disclose personal information about patients without permission
Masquerading attackAuthorized authentication mechanisms and methods will try to break by bypassing users
Session hijackingAn attacker could gain control of consoles or settings for a session
Brute force attackTo recover the private key with all possible keys in the keyspace
Data removalEnemies remove the data
Forgery attackThe enemy will play the command illegally and try to play it illegally
Viruses/wormsVirus, worm, crash the operating system
Data theftStatic and dynamic data