Attacks

Risks

Spoofing

Authenticity, integrity and confidentiality.

Signal/Radio Jamming

Availability and integrity.

Device-tampering/Node-capturing

Availability, integrity, authenticity and confidentiality.

Path-based DoSAttack

Availability and authenticity.

Node Outage

Availability and authenticity.

Eavesdropping

Confidentiality.