Review Article

A Comprehensive Taxonomy and Analysis of IEEE 802.15.4 Attacks

Table 1

Comparative analysis of IEEE 802.15.4 PHY layer attacks.

AttackEnergy efficiencyEffectivenessStealthinessPrimary security goals
IntegrityAvailability

Wide-Band DenialLow [3]HighLow [3]× √ [7]
Constant JammingLow [6]HighLow [6]
Deceptive JammingLow [6]HighModerate [6]
Random JammingModerate [6]Moderate [6]Moderate [6]
Interrupt JammingHigh [5]High [5]High [4]
Activity Jamming and Scan JammingModerate [5]HighModerate [5]
Node-Specific Denial and Message-Specific DenialHighHighHigh
Message Manipulation AttacksNo enough information√ [8]×
Steganography AttacksDependent××