Journal of Electrical and Computer Engineering / 2016 / Article / Tab 1

Review Article

A Comprehensive Taxonomy and Analysis of IEEE 802.15.4 Attacks

Table 1

Comparative analysis of IEEE 802.15.4 PHY layer attacks.

AttackEnergy efficiencyEffectivenessStealthinessPrimary security goals
IntegrityAvailability

Wide-Band DenialLow [3]HighLow [3]× √ [7]
Constant JammingLow [6]HighLow [6]
Deceptive JammingLow [6]HighModerate [6]
Random JammingModerate [6]Moderate [6]Moderate [6]
Interrupt JammingHigh [5]High [5]High [4]
Activity Jamming and Scan JammingModerate [5]HighModerate [5]
Node-Specific Denial and Message-Specific DenialHighHighHigh
Message Manipulation AttacksNo enough information√ [8]×
Steganography AttacksDependent××

We are committed to sharing findings related to COVID-19 as quickly and safely as possible. Any author submitting a COVID-19 paper should notify us at help@hindawi.com to ensure their research is fast-tracked and made available on a preprint server as soon as possible. We will be providing unlimited waivers of publication charges for accepted articles related to COVID-19. Sign up here as a reviewer to help fast-track new submissions.