Review Article

A Comprehensive Taxonomy and Analysis of IEEE 802.15.4 Attacks

Table 2

Comparative analysis of IEEE 802.15.4 MAC layer attacks (√ for cause, √√ for effect).

AttackDoS intentPrimary security goals
ExhaustionCollisionUnfairnessSleepConfidentialityIntegrityAuthenticityAvailability

Link Layer Jamming√√×××√√
Node-Specific Flooding××××√√√√
BLE pretense, constant BE, RNG tampering, and CCA reduction×√√ [7]××××√√×
Back-off countdown omission and CCA omission√√ [7]××××√√×
Same-Nonce Attack×××√√××××
Replay-Protection Attack×√√×××√√
ACK spoofing attack×√√×××√√√√×
ACK dropping attack××××√√√√
MITM Attack×√√××√√√√√√×
PANId Conflict Attack××××√√√√
DoS against data transmissions during CFP××××√√√√×
DoS against GTS Requests×××××√√√√
False Data Injection×××√√√√√√√√
Stealing network bandwidth×××√√×√√√√
DoS against CAP maintenance×××××√√√√
Interference during CFP√√×××√√
Ping-Pong Effect××××√√√√
Bootstrapping Attack×√√××××√√
Steganography Attack×××××××