Physical Attack: Unauthorized access to gateway hardware, and unauthorized geographical movement.
Software Attack: Virus, Trojan, Worms, Denial of Services, Jamming. Safety-critical information such as warnings of a broken gas line can go unnoticed through DDoS of IoT sensor information.
Network Attack: Node Capture, Node Subversion, Node Malfunctioning, Message Corruption, Routing Attacks, False Node.
Cryptanalysis Attack: Ciphertext only, Known-plaintext, chosen plaintext, Man in the middle attack.
Side Channel Attack: Micro Probing, Reverse Engineering.