Skip to main content
. 2022 Nov 24;22(23):9123. doi: 10.3390/s22239123

Table 2.

Protection against attacks.

ID MiTM Replay Modification Tampering DoS Session Key Disclosure Impersonation Sybil Forgery Bogus Eavesdropping Plaintext Key Leakage Chosen Message Ciphertext Beacon Trans. Denial
PS01
PS02
PS03
PS04
PS05
PS06
PS07
PS08
PS09 *
PS10
PS11
PS12
PS13
PS14
PS15
PS16 *
PS17
PS18
PS19
PS20
PS21
PS22
PS23
PS24
PS25
PS26
PS27
PS28
PS29
PS30
PS31
PS32
PS33
PS34
PS35
PS36
PS37
PS38
PS39
PS40
PS41
PS42
PS43
PS44
PS45
PS46 *
PS47

* Not defined. √ Defined.