Review Article
A Comprehensive Taxonomy and Analysis of IEEE 802.15.4 Attacks
Table 1
Comparative analysis of IEEE 802.15.4 PHY layer attacks.
| Attack | Energy efficiency | Effectiveness | Stealthiness | Primary security goals | Integrity | Availability |
| Wide-Band Denial | Low [3] | High | Low [3] | × | √ [7] | Constant Jamming | Low [6] | High | Low [6] | Deceptive Jamming | Low [6] | High | Moderate [6] | Random Jamming | Moderate [6] | Moderate [6] | Moderate [6] | Interrupt Jamming | High [5] | High [5] | High [4] | Activity Jamming and Scan Jamming | Moderate [5] | High | Moderate [5] | Node-Specific Denial and Message-Specific Denial | High | High | High | Message Manipulation Attacks | No enough information | √ [8] | × | Steganography Attacks | Dependent | × | × |
|
|