Research Article
A Regulation-Based Security Evaluation Method for Data Link in Wireless Sensor Network
Table 2
Description of defense methods against threats.
| ID | Defense method | Used against Threat (IV.A) |
| A | Sequence numbers in each message | 1; 2; 3; 4 | B | Time Stamp of the sending time | 1; 4; 6 | C | Timeout for reception windows | 2; 6 | D | Source and destination identifiers in each message | 3 | E | Feedback messages (ack messages) | 3; 7; 9 | F | Identification procedure about the members identity before a single transmission or at system boot | 3; 7 | G | Safety Code in messages (es.CRC) | 5 | H | Cryptographic techniques | 5; 7 | I | Redundancy, that is, message periodic replication | 1; 2; 3; 4; 5 | J | Membership control: members monitor each other to discover malfunctions. Exception code handling is performed in positive case. | 8 | K | Atomic Broadcast: transmissions are broadcasted to all target nodes in the same order | 8 | L | Time-Triggered architecture: messages are scheduled also with a time-priority handler | 1; 2; 4; 5; 8; 6; 10 | M | Bus Guardian: access to the transmission channel is controlled by a hardware that avoids simultaneous access. | 1 | N | Prioritization of messages: prioritization of messages based on their content-type | 8; 6 | O | Inhibit messages: transmitted messages can’t be re-transmitted before a timeout period | 1; 6; 8 | P | Hamming Distance scheme application to node address and message identifiers | 3; 7 |
|
|