Journal of Electrical and Computer Engineering / 2016 / Article / Tab 2

Review Article

A Comprehensive Taxonomy and Analysis of IEEE 802.15.4 Attacks

Table 2

Comparative analysis of IEEE 802.15.4 MAC layer attacks (√ for cause, √√ for effect).

AttackDoS intentPrimary security goals
ExhaustionCollisionUnfairnessSleepConfidentialityIntegrityAuthenticityAvailability

Link Layer Jamming√√×××√√
Node-Specific Flooding××××√√√√
BLE pretense, constant BE, RNG tampering, and CCA reduction×√√ [7]××××√√×
Back-off countdown omission and CCA omission√√ [7]××××√√×
Same-Nonce Attack×××√√××××
Replay-Protection Attack×√√×××√√
ACK spoofing attack×√√×××√√√√×
ACK dropping attack××××√√√√
MITM Attack×√√××√√√√√√×
PANId Conflict Attack××××√√√√
DoS against data transmissions during CFP××××√√√√×
DoS against GTS Requests×××××√√√√
False Data Injection×××√√√√√√√√
Stealing network bandwidth×××√√×√√√√
DoS against CAP maintenance×××××√√√√
Interference during CFP√√×××√√
Ping-Pong Effect××××√√√√
Bootstrapping Attack×√√××××√√
Steganography Attack×××××××

We are committed to sharing findings related to COVID-19 as quickly and safely as possible. Any author submitting a COVID-19 paper should notify us at help@hindawi.com to ensure their research is fast-tracked and made available on a preprint server as soon as possible. We will be providing unlimited waivers of publication charges for accepted articles related to COVID-19. Sign up here as a reviewer to help fast-track new submissions.