to deliver updates securely. It is possible that a hacker may succeed in accessing the credentials
of AES with the help of SCA (side channel analysis). Afterwards, they misuse these keys and
take control of the street lights. This is not merely an example; there have been a number of
similar cases in the past.
In order to carry out such attack, the hacker must be within a specific device proximity
range so they can not only plan their attack but also collect private and sensitive data. In the
aftermath of the attack, there are no remnants. While we have so far described the vulnerability
of street lights, the SCA attacks have been used to launch ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month, and much more.