Table 1.
Security issues, threats, and technologies.
| Architecture Layer | Threats in Security | Weaknesses | Related Works | Attacks |
|---|---|---|---|---|
| Application Layer | ||||
| Internet | Confidentiality | Access Centralization | [25,26,27,28,29] | Pishing, Malware |
| Transport Layer | ||||
| Wireless | Rogue access points, Misconfiguration | Hacking, Signal lost | [30,31,32,33,33] | DoS, War dialing, protocol tunneling; man-in-the-middle |
| Perception Layer | ||||
| Sensor Nodes | DoS, Exhaustion, Unfairness, Sybil | Flooding, Routing Protocols | [30,34,35,36,37,38,39] | Jamming, Tampering, Collisions |