Research Article
A Secure Localization Approach Using Mutual Authentication and Insider Node Validation in Wireless Sensor Networks
Table 1
Summarization of layer wise attacks on localization in WSNs [
9].
| Layers | Attacks | Attack behaviour | Results |
| Physical layer | Stealing | Signal eavesdropping and tampering | Packet error and packet loss | Jamming | Sending jamming signal in the working frequency range | Packet loss |
| Data link layer | Collision | Repetition of messages | Packet loss | Exhaustion | Sending of unnecessary message | Packet loss | Unfairness | Explicitly take the control of the channel | Packet loss |
| Network layer | DoS Attacks | Exhaustion of energy of the unknown nodes | Packet loss | Selective forwarding | Selectively forward packets | Packet loss | Sybil | Possessing multiple identities | Packet error | Sinkhole | Maliciously tamper with routing | Packet error | Wormhole | Shortening the distance to make a fast routing path | Packet loss |
| Transport layer | Flooding | Establishing false connections | Packet loss | Tampering | Tampering localization beacons | Packet error |
|
|