OSI Layer

Attacks

Physical Layer

Eaves dropping, Jamming, Active Interference

Data Link Layer

Selfish node behaviour, Malicious node behaviour, DoS (Denial of service), Integrity, Misrouting Traffic

Network Layer

Black Hole, Wormhole, Sinkhole, Replay, Link spoofing, Resource consumption, Sybil

Transport Layer

SYN Flooding, Session Hijacking

Application Layer

Malicious behavior, Data corruption, Virus