According to a prominent cybersecurity expert, if a single tiny electromagnetic actuator
is brought close to the speed sensors of the ABS wheel, then it is possible to spoof the speed
of the wheel sensors through injection of a magnetic ﬁeld. This ﬁle can take place of the orig-
inal signal. It is important to note that the mounted attacks are noninvasive; hence there is
no need to modify the ABS hardware. This also makes it more dicult for the mechanisms
of intrusion detection to ﬁnd the presence of a spooﬁng attack. According to experiments,
if carried out correctly, this attack can ultimately take control from the driver and cause an
How Does IP Spooﬁng Work?
IP spooﬁng is the use of IP (internet protocol) packets that are used to have a changed source
address to disguise the sender’s identity. This is done to masquerade as another system. Such a
technique is utilized by cybercriminals to initiate DDoS attacks against IoT devices.
Networked devices send and receive internet protocol packets in order to communicate
with each other, it is how the internet works. These packets consist of a header and a body. The
former stores routing information for instance what the source address is. Usually, the source
IP address in a packet is the party who sends the packet. When spooﬁng is applied to the packet,
this address can be changed.
In layman terms, consider that IP spooﬁng is similar to how a cybercriminal can send
a package to a victim and modify the return address. When the victim gets the package and
tries to block those sent packages, then they cannot stop it because the fake return address
can always be changed. Moreover, in case the receiver plans to reply with a package, then their
response will not reach the intended sender.
DDoS attacks use spooﬁng to bombard a target with a huge inﬂux of internet trac; the
source’s identity is masked through an operation which makes it hard to mitigate. When the
source internet protocol address gets modiﬁed and is constantly randomized, then it is quite
hard to stop the virus-aided requests. According to cybersecurity and law enforcement agen-
cies experts, it is hard for them to track down hackers who use IP spooﬁng. Sometimes spooﬁng
is applied so only the replies by the cybercriminals are provided to the victim’s device.
How to avoid IP Spoofing attack?
TARGETING CAMERAS IN IoT ECOSYSTEM
Dierent types of cameras are used in the IoT ecosystem for a wide range of purposes. For
example, they are used in security solutions to thwart o burglars and robbers from residential
and commercial properties. Similarly, some retail businesses use it to manage their inventory
while governments are using them for the management of “smart cities” for instance to monitor
trac jams and reduce trac congestion. However, these cameras are often targeted speciﬁcally
by the cybercriminals to proceed with their nefarious mechanisms. Here are some examples of
how they are hacked in the ﬁrst place.
292 Internet of Things
Internet_of_Things_CH11_pp271-308.indd 292 9/3/2019 10:16:20 AM