Skip to main content
. 2016 Jun 15;16(6):879. doi: 10.3390/s16060879

Table 1.

Security attacks, compromised security requirements and countermeasures.

Security Attack Compromised Security Requirement Countermeasure
Denial of Service (DoS) Availability Digital Signature
Jamming, Flooding Availability Digital Signature
Sybil Availability, Authentication Digital Signature
Malware, Spamming, Black hole, Grey hole, Sink hole, Warm hole Availability, Authentication Digital Signature
Eavesdropping Confidentiality Encryption
Data Interception Confidentiality Encryption
Falsified Entities Authentication, Authorization Digital Signature and Encryption
Cryptographic Replication Authentication, Authorization Digital Signature and Encryption
GNSS Spoofing Authentication, Authorization Digital Signature and Encryption
Timing Authentication, Authorization Digital Signature and Encryption
Masquerading Data Integrity Digital Signature with Certificate
Data Playback Data Integrity Digital Signature with Certificate
Data Alteration Data Integrity Digital Signature with Certificate