Vulnerability

Threat-Source

Threat-Action

Vulnerability 1:

Sensor broadcast data on the wireless medium

Any internal or external entity

Data Theft, Intrusion on privacy

Vulnerability 2:

Sensor nodes are physically

accessible and not tamper resistant

Any internal or external entity

Destruction of sensors,

Stealing sensors. Insert new sensors, Capture data,

Spoofing, Generate false data

Vulnerability 3:

Sensors are restricted devices

External entity

Denial of Service

Vulnerability 4:

Data is stored in a database

without means of encryption

Any internal or external entity

Data Theft, Intrusion on privacy, System intrusion,

Destruction of data,

Modification and Fabrication of data

Vulnerability 5:

Data is transported through the System without encryption measures

Any internal or external entity

Data Theft, Destruction,

Modification, Fabrication,

Intrusion on privacy