Research Article

A Regulation-Based Security Evaluation Method for Data Link in Wireless Sensor Network

Table 4

Correlation between defense methods and WSN attacks.

ID Defense methodsAttacks
Jamming Tampering Exhaustion and interrogation Selective forwarding Misdirection Sinkholes Wormholes Sybil Attack Flooding Homing

ASequence Number 32221321*
BTime Stamp 22111221
DSource and destination identifiers 11111
PHanning Distance 111211

CTimeout 1222112**
EFeedback messages 222111
IRedundancy 42221321
OInhibit messages 22121221

GSafety Code 1
HCryptographic 111

KAtomic Broadcast 111
MBus Guardian 1111

LTime-triggered architecture 53232522#
NPrioritization of messages 11121111

FIdentification procedure 111211##
JMembership control 111

QDynamic Routing 1$