Denial of Service (DoS) |
Availability |
Digital Signature |
Jamming, Flooding |
Availability |
Digital Signature |
Sybil |
Availability, Authentication |
Digital Signature |
Malware, Spamming, Black hole, Grey hole, Sink hole, Warm hole |
Availability, Authentication |
Digital Signature |
Eavesdropping |
Confidentiality |
Encryption |
Data Interception |
Confidentiality |
Encryption |
Falsified Entities |
Authentication, Authorization |
Digital Signature and Encryption |
Cryptographic Replication |
Authentication, Authorization |
Digital Signature and Encryption |
GNSS Spoofing |
Authentication, Authorization |
Digital Signature and Encryption |
Timing |
Authentication, Authorization |
Digital Signature and Encryption |
Masquerading |
Data Integrity |
Digital Signature with Certificate |
Data Playback |
Data Integrity |
Digital Signature with Certificate |
Data Alteration |
Data Integrity |
Digital Signature with Certificate |