Skip to main content
. 2021 Jun 26;21(13):4388. doi: 10.3390/s21134388

Table 1.

Security issues, threats, and technologies.

Architecture Layer Threats in Security Weaknesses Related Works Attacks
Application Layer
Internet Confidentiality Access Centralization [25,26,27,28,29] Pishing, Malware
Transport Layer
Wireless Rogue access points, Misconfiguration Hacking, Signal lost [30,31,32,33,33] DoS, War dialing, protocol tunneling; man-in-the-middle
Perception Layer
Sensor Nodes DoS, Exhaustion, Unfairness, Sybil Flooding, Routing Protocols [30,34,35,36,37,38,39] Jamming, Tampering, Collisions