Table 3: Analysis in local key management.

Attack typesRPKHLDKHKMS

Selective forwarding××
Sink-Hole attack×
Sybil attack
Worm-Hole
HELLO flood
DoS××