Review Article
A Comprehensive Taxonomy and Analysis of IEEE 802.15.4 Attacks
Table 2
Comparative analysis of IEEE 802.15.4 MAC layer attacks (√ for cause, √√ for effect).
| Attack | DoS intent | Primary security goals | Exhaustion | Collision | Unfairness | Sleep | Confidentiality | Integrity | Authenticity | Availability |
| Link Layer Jamming | √√ | √ | √ | × | × | × | √√ | √ | Node-Specific Flooding | × | √ | √ | × | × | × | √√ | √√ | BLE pretense, constant BE, RNG tampering, and CCA reduction | × | √√ [7] | × | × | × | × | √√ | × | Back-off countdown omission and CCA omission | √ | √√ [7] | × | × | × | × | √√ | × | Same-Nonce Attack | × | × | × | √√ | × | × | × | × | Replay-Protection Attack | × | √√ | √ | × | × | × | √√ | √ | ACK spoofing attack | × | √√ | × | × | × | √√ | √√ | × | ACK dropping attack | × | √ | √ | × | × | × | √√ | √√ | MITM Attack | × | √√ | × | × | √√ | √√ | √√ | × | PANId Conflict Attack | × | √ | √ | × | × | × | √√ | √√ | DoS against data transmissions during CFP | × | √ | × | × | × | √√ | √√ | × | DoS against GTS Requests | × | √ | × | × | × | × | √√ | √√ | False Data Injection | × | √ | × | × | √√ | √√ | √√ | √√ | Stealing network bandwidth | × | √ | × | × | √√ | × | √√ | √√ | DoS against CAP maintenance | × | √ | × | × | × | × | √√ | √√ | Interference during CFP | √√ | √ | √ | × | × | × | √√ | √ | Ping-Pong Effect | × | √ | √ | × | × | × | √√ | √√ | Bootstrapping Attack | × | √√ | × | × | × | × | √√ | √ | Steganography Attack | × | √ | × | × | × | × | × | × |
|
|