|
Attack | Compromised services | Countermeasures |
|
DOS | Availability, authentication | Use the bit commitment and signature-based authentication technique |
Jamming | Availability | Use frequency hopping technique, direct-sequence spread spectrum (DSSS) |
Malware | Availability | Reliable hardware and digital signature of software |
Broadcast tampering | Availability, integrity | Cryptographic primitives are enabled for prevention, but a nonrepudiation mechanism may exist |
Blackhole, grayhole | Availability | Reliable hardware and digital signature of software |
Greedy behavior | Availability | Use intrusion detection systems (IDSs) |
Spamming | Availability, confidentiality | Reliable hardware and digital signature of software |
Eavesdropping | Confidentiality, integrity | Exploit physical layer security protocols |
Traffic analysis | Confidentiality | Use encryption techniques |
Man-in-the-middle | Authentication, confidentiality, integrity | Robust authentication technique such as digital certificates |
Social | Confidentiality | Use digital signatures |
Sybil | Availability, authentication | Deployment of central validation authority (VA), location and position verification, and efficient allocation of transmission resources. |
Tunneling | Integrity | Reliable hardware and digital signature of software and sensors |
GPS spoofing | Authentication | Signature-based authentication technique with positioning system and the usage of bit commitment |
Free-riding | Authentication | Use strong authentication technique |
Key and/or certificate replication | Confidentiality, authentication | Use certified keys, and check the validity of certificates in real time through CRL |
Message tampering | Availability, authentication | Zero-knowledge schemes for authenticate message |
Masquerading | Authentication, nonrepudiation, integrity | Digital signature of software, and trusted and reliable hardware which makes impossible to change protocols |
Replay | Authentication, integrity, nonrepudiation | Message authentication, using digital signature scheme |
Illusion | Authentication, integrity | Software must be handled by authorized entity, sensors operation must be authenticated, and use the plausibility validation network (PVN) |
Repudiation | Nonrepudiation | Identity-based signature and ID-based online/offline (IBOOS) techniques with complex managing certificates may exist |
|