| Attacks | Risks |
| Spoofing | Authenticity, integrity and confidentiality. |
| Signal/Radio Jamming | Availability and integrity. |
| Device-tampering/Node-capturing | Availability, integrity, authenticity and confidentiality. |
| Path-based DoSAttack | Availability and authenticity. |
| Node Outage | Availability and authenticity. |
| Eavesdropping | Confidentiality. |