Across
- 3. attack takes place when an attacker sets up a fake Wi-Fi access point hoping that users will connect to it instead of a legitimate one
- 5. Cryptographic tool.
- 7. layer of bluetooths networking stack used by the bluesmack attacker
Down
- 1. Attack in which false information is produced by an attacker.
- 2. bluetooth device hijacks another with spam advertising.
- 4. software component used to assess the security robustness of the ZigBee protocol/network (pen testing tool)
- 5. physical attacks like jamming the system with noise interference, blocking radio signals etc.
- 6. attack where a fake tag tries to interact with a genuine reader and fool the reader into thinking it is a real card.
