Attack type | Attacker behavior |
Selective forwarding, black-hole, grey-hole | A malicious node discards part or all packets |
Sinkhole attack | A malicious node tries to attract traffic advertising and fake routing information, and then it does not forward it |
Replay attack | A malicious node continues to send the same data repeatedly |
Link spoofing attack | A malicious node can deceive the link layer verification mechanism, so that the sender of the packet thinks that the packet has been forwarded successfully |
Modification attack | A malicious node modifies the data packets that it forwards |
Sybil attack | An attacker presents multiple identities |
Collusion attack | Many powerful attackers work in collusion to implement attacks |
Flooding attack | A malicious node sends a large number of packets to overwhelm the normal nodes |
Bad mouthing attack | A malicious node provides dishonest recommendations |