Research Article
[Retracted] Machine-to-Machine Communication for Device Identification and Classification in Secure Telerobotics Surgery
Table 1
Attacks in IoT and telerobotic surgery.
| Type of attacks | Investigation scenarios |
| Replay attack | The enemy will play a legitimate message/command illegally later | Eavesdropping | Attackers passively enter conversations and disclose personal information about patients without permission | Masquerading attack | Authorized authentication mechanisms and methods will try to break by bypassing users | Session hijacking | An attacker could gain control of consoles or settings for a session | Brute force attack | To recover the private key with all possible keys in the keyspace | Data removal | Enemies remove the data | Forgery attack | The enemy will play the command illegally and try to play it illegally | Viruses/worms | Virus, worm, crash the operating system | Data theft | Static and dynamic data |
|
|