Research Article
A Regulation-Based Security Evaluation Method for Data Link in Wireless Sensor Network
Table 4
Correlation between defense methods and WSN attacks.
|
ID |
Defense methods | Attacks | | Jamming | Tampering | Exhaustion and interrogation | Selective forwarding | Misdirection | Sinkholes | Wormholes | Sybil Attack | Flooding | Homing | |
| A | Sequence Number | 3 | — | 2 | 2 | 2 | 1 | 3 | — | 2 | 1 | * | B | Time Stamp | 2 | — | 2 | 1 | 1 | 1 | 2 | — | 2 | 1 | D | Source and destination identifiers | 1 | — | 1 | 1 | 1 | — | — | — | 1 | — | P | Hanning Distance | 1 | — | 1 | 1 | 2 | — | — | 1 | 1 | — |
| C | Timeout | — | — | 1 | 2 | 2 | 2 | 1 | — | 1 | 2 | ** | E | Feedback messages | 2 | — | 2 | 2 | 1 | — | — | 1 | 1 | — | I | Redundancy | 4 | — | 2 | 2 | 2 | 1 | 3 | — | 2 | 1 | O | Inhibit messages | 2 | — | 2 | 1 | 2 | 1 | 2 | — | 2 | 1 |
| G | Safety Code | 1 | — | — | — | — | — | — | — | — | — | † | H | Cryptographic | 1 | — | — | — | 1 | — | — | 1 | — | — |
| K | Atomic Broadcast | 1 | — | — | — | 1 | — | 1 | — | — | — | ‡ | M | Bus Guardian | 1 | — | 1 | — | — | — | 1 | — | 1 | — |
| L | Time-triggered architecture | 5 | — | 3 | 2 | 3 | 2 | 5 | — | 2 | 2 | # | N | Prioritization of messages | 1 | — | 1 | 1 | 2 | 1 | 1 | — | 1 | 1 |
| F | Identification procedure | 1 | — | 1 | 1 | 2 | — | — | 1 | 1 | — | ## | J | Membership control | 1 | — | — | — | 1 | — | 1 | — | — | — |
| Q | Dynamic Routing | — | 1 | — | — | — | — | — | — | — | — | $ |
|
|