Research Article
A Regulation-Based Security Evaluation Method for Data Link in Wireless Sensor Network
Table 4
Correlation between defense methods and WSN attacks.
| |
ID |
Defense methods | Attacks | | | Jamming | Tampering | Exhaustion and interrogation | Selective forwarding | Misdirection | Sinkholes | Wormholes | Sybil Attack | Flooding | Homing | |
| | A | Sequence Number | 3 | — | 2 | 2 | 2 | 1 | 3 | — | 2 | 1 | * | | B | Time Stamp | 2 | — | 2 | 1 | 1 | 1 | 2 | — | 2 | 1 | | D | Source and destination identifiers | 1 | — | 1 | 1 | 1 | — | — | — | 1 | — | | P | Hanning Distance | 1 | — | 1 | 1 | 2 | — | — | 1 | 1 | — |
| | C | Timeout | — | — | 1 | 2 | 2 | 2 | 1 | — | 1 | 2 | ** | | E | Feedback messages | 2 | — | 2 | 2 | 1 | — | — | 1 | 1 | — | | I | Redundancy | 4 | — | 2 | 2 | 2 | 1 | 3 | — | 2 | 1 | | O | Inhibit messages | 2 | — | 2 | 1 | 2 | 1 | 2 | — | 2 | 1 |
| | G | Safety Code | 1 | — | — | — | — | — | — | — | — | — | † | | H | Cryptographic | 1 | — | — | — | 1 | — | — | 1 | — | — |
| | K | Atomic Broadcast | 1 | — | — | — | 1 | — | 1 | — | — | — | ‡ | | M | Bus Guardian | 1 | — | 1 | — | — | — | 1 | — | 1 | — |
| | L | Time-triggered architecture | 5 | — | 3 | 2 | 3 | 2 | 5 | — | 2 | 2 | # | | N | Prioritization of messages | 1 | — | 1 | 1 | 2 | 1 | 1 | — | 1 | 1 |
| | F | Identification procedure | 1 | — | 1 | 1 | 2 | — | — | 1 | 1 | — | ## | | J | Membership control | 1 | — | — | — | 1 | — | 1 | — | — | — |
| | Q | Dynamic Routing | — | 1 | — | — | — | — | — | — | — | — | $ |
|
|