Research Article
A Regulation-Based Security Evaluation Method for Data Link in Wireless Sensor Network
Table 1
Defense methods versus CC requirements.
| SFRs | Counter measure |
| FCO_NRO | Source and destination identifier in each message | FCO_NRR | Feedback messages (ack messages) | FIA_UID | Membership control-bus guardian | FDP_ITT | Safety code | FDP_ACC | Identification procedure-address filtering | FDP_IFC | I/O are physically defined in RF circuits | FDP_IFF | Handshake in PtP link | FDP_UIT | Timeout; timestamp; shared network identification |
|
|