Research Article
A Regulation-Based Security Evaluation Method for Data Link in Wireless Sensor Network
Table 3
Connection table between WSN attacks taxonomy and EN50159 threats.
| |
Threat | Attack | | Jamming | Tampering | Exhaustion and Interrogation | Selective Forwarding | Misdirection | Sinkholes | Wormholes | Sybil Attack | Flooding | Homing |
| | Repetition | X | | X | | | | X | | X | | | Deletion | | | | X | X | X | X | | | X | | Insertion | X | | X | X | X | | | | X | | | Incorrect sequence | X | | | | | | X | | | | | Corruption | X | | | | | | | | | | | Delay | | | X | X | X | X | | | X | X | | Masquerade | | | | | X | | | X | | | | Excessive Jitter | X | | | | X | | X | | | | | Inconsistency | X | | X | X | | | | | | | | Too early messages | X | | | | | | X | | | |
|
|