Vulnerability | Threat-Source | Threat-Action |
Vulnerability 1: Sensor broadcast data on the wireless medium | Any internal or external entity | Data Theft, Intrusion on privacy |
Vulnerability 2: Sensor nodes are physically accessible and not tamper resistant | Any internal or external entity | Destruction of sensors, Stealing sensors. Insert new sensors, Capture data, Spoofing, Generate false data |
Vulnerability 3: Sensors are restricted devices | External entity | Denial of Service |
Vulnerability 4: Data is stored in a database without means of encryption | Any internal or external entity | Data Theft, Intrusion on privacy, System intrusion, Destruction of data, Modification and Fabrication of data |
Vulnerability 5: Data is transported through the System without encryption measures | Any internal or external entity | Data Theft, Destruction, Modification, Fabrication, Intrusion on privacy |