Research Article
Mathematical Modeling of Multiattack Behavior Discrimination in the WSN Based on Incidence Matrix
Table 2
Information table of three attack characteristics.
| Type of attack | Attack characteristics |
| The black hole attack | Only receives data, do not forward data to the base station, and do not send any collected data | The DOS attack | Keeps sending packets, resulting in network congestion | The selective forwarding attack | Sends data packets or forward fusion data to the base station in a specific time period |
|
|