Review Article
Threats and Corrective Measures for IoT Security with Observance of Cybercrime: A Survey
Table 4
Taxonomy of various attacks and defence mechanism at different layers.
| Application layer | Network layer | Perception layer | Transport layer | Attack | Possible defence mechanism | Attack | Possible defence mechanism | Attack | Possible defence mechanism | Attack | Possible defence mechanism |
| Common injection attack | OpenHab technology IoTOne technology | Node misbehaviour and service attack | Reputation based | Cipher text attack | Encryption based on Hash | Flooding attack | Compressed DTLS header | Attack on privacy | Preference-based protection | Identity theft attack | Identity management framework | DDoS attack | PKI protocol | Replay attack | Compressed IPsec | Identity spoofing attack | Security framework based on Identity | Fault injection attack | Risk-based adaptive framework | Phishing attack | Secure authorization OAuth | Routing attack | ECC DTLS 6LoWPAN Border router ECC | | | Side channel attack | SDN-enabled IoT | Side channel attack | Lightweight cryptography | | | | No forwarding attack | Cooperative nodes protocol | Crypt-analysis attack | Framework based on embedded security | | | | Eavesdropping | Cluster-based IDS | | | | |
|
|