Skip to main content
. 2024 Jun 28;10:e2130. doi: 10.7717/peerj-cs.2130

Table 1. Types of attack.

(Ref)/(Year) Different attack Network device Prevention Remarks
De Araujo-Filho et al. (2021) Hindering cyber-attacks CAN Unsupervised intrusion prevention system Improves security
Mwinuka et al. (2022) Network spoofing attack WSN Android-based client-side Fake access is prevented
Huang et al. (2022) forgery attacks WSN Wireless signals to detect looped videos Surveillance systems
Tran Le et al. (2022) Malware attacks WSN networks Epidemiological mathematical model Encryption and authentication in Wi-Fi
Li et al. (2021) impersonation attack Wi-Fi Meta-WF AWID dataset
Sharma, Elmiligi & Gebali (2021) Hello flood attack, increased version attack, decreased rank attack, DIS attack. Wireless sensor network. SVM, Bayes classifier, random forest. Reinforcement learning needs to be used.
Sun, Yuan & Fan (2022) Real world attack connections WSN High–interaction honeypot (HIH), Low–interaction honeypot (LIH) Time related connection properties dynamically need to be used
Kaya & Selcuk (2020) Post connection attacks Wireless sensor network Automated database scanning method Analysis of security is need to be improved
Lounis & Zulkernine (2020) WPA3 connection attacks WSN WPA3-SAE (Simultaneous Authentication of Equals) Improve security
Salmi & Oughdir (2022) DoS attacks WSN CNN–LSTM method Improves network security
Proposed DELETE attack, CONNECT attack, OPTIONS attack and TRACE attack WSN Cyclic analysis method (CAM) Reduces time complexity and space complexity