Research Article
A Regulation-Based Security Evaluation Method for Data Link in Wireless Sensor Network
Table 3
Connection table between WSN attacks taxonomy and EN50159 threats.
|
Threat | Attack | Jamming | Tampering | Exhaustion and Interrogation | Selective Forwarding | Misdirection | Sinkholes | Wormholes | Sybil Attack | Flooding | Homing |
| Repetition | X | | X | | | | X | | X | | Deletion | | | | X | X | X | X | | | X | Insertion | X | | X | X | X | | | | X | | Incorrect sequence | X | | | | | | X | | | | Corruption | X | | | | | | | | | | Delay | | | X | X | X | X | | | X | X | Masquerade | | | | | X | | | X | | | Excessive Jitter | X | | | | X | | X | | | | Inconsistency | X | | X | X | | | | | | | Too early messages | X | | | | | | X | | | |
|
|