Attacks | Risks |
Spoofing | Authenticity, integrity and confidentiality. |
Signal/Radio Jamming | Availability and integrity. |
Device-tampering/Node-capturing | Availability, integrity, authenticity and confidentiality. |
Path-based DoSAttack | Availability and authenticity. |
Node Outage | Availability and authenticity. |
Eavesdropping | Confidentiality. |