Journal of Computer Networks and Communications / 2014 / Article / Tab 3

Research Article

A Regulation-Based Security Evaluation Method for Data Link in Wireless Sensor Network

Table 3

Connection table between WSN attacks taxonomy and EN50159 threats.

Jamming Tampering Exhaustion and Interrogation Selective Forwarding Misdirection Sinkholes Wormholes Sybil Attack Flooding Homing

Repetition XXXX
Deletion XXXXX
Insertion XXXXX
Incorrect sequence XX
Corruption X
Masquerade XX
Excessive Jitter XXX
Inconsistency XXX
Too early messages XX