November 2018
Intermediate to advanced
382 pages
11h 20m
English
Consider the deployment environment for your IoT devices. Even if they are limited to extremely short range communications, there are opportunities for attackers to take advantage of weaknesses. For example, even though Near Field Technology (NFC) operates over short distances, an attacker could install a sniffer in close proximity to the NFC reader. To mitigate this, place cameras or guards near NFC readers and monitor for suspicious behavior near the reader.
Another consideration is the potential for an attacker to make use of the signals emanating from an environment to map out the WSN infrastructure. It is often possible to tune the power rating of ZigBee and Z-Wave devices to minimize signal leakage ...