Low networking capabilities in bandwidth, throughput and
data rate along with the minimal computation power for real
time aggregations and buffering, which are needed for secure
networking, make the smart objects susceptible to attacks at
the network layer. At the MAC layer security issues occur due
to collisions and channel occupations, which may disable
transmission opportunities for some users, exhausting the
batteries of the devices in parallel. At the physical layer
jamming, DoS, traffic analysis, injection and tampering are
very serious security threats for smart objects. Especially, the
inability of many objects to acquire IP addresses makes them
vulnerable to attacks (such as DoS) that in powerful IP hardware
devices, running efficient security protocols, can be
avoided successfully.
Low networking capabilities in bandwidth, throughput anddata rate along with the minimal computation power for realtime aggregations and buffering, which are needed for securenetworking, make the smart objects susceptible to attacks atthe network layer. At the MAC layer security issues occur dueto collisions and channel occupations, which may disabletransmission opportunities for some users, exhausting thebatteries of the devices in parallel. At the physical layerjamming, DoS, traffic analysis, injection and tampering arevery serious security threats for smart objects. Especially, theinability of many objects to acquire IP addresses makes themvulnerable to attacks (such as DoS) that in powerful IP hardwaredevices, running efficient security protocols, can beavoided successfully.
การแปล กรุณารอสักครู่..
