1 |
Physical layer |
Interception, radio interference, jamming, tempering, Sybil attack. |
2 |
Data link layer |
Replay attack, Spoofing, altering routing attack, Sybil Attack, collision, traffic analysis, and monitoring, exhaustion. |
3 |
Network layer |
Black hole attack, wormhole attack, sinkhole attack, grey hole attack, selective forwarding attack, hello flood attack, misdirection attack, internet smurf attack, spoofing attack. |
4 |
Transport layer |
De-synchronization, transport layer flooding attack. |
5 |
Application layer |
Spoofing, alter routing attack, false data ejection, path-based DoS. |