Attacks

Security Requirements

Countermeasures

DoS

Availability

Switching Options, APDA, RRDA, IP-chock, and DMN

Sybil

Authentication

Availability

RRDA, IP-chock, Received Signal Strength, Footprint, Resemblance of the neighboring nodes, and DMN

Information Disclosure

Privacy

PLPCA, LESPP, and Digital Signature

Suppression/Alteration

Availability

Integrity

Digital Signature, and DMN

Impersonation/Masquerading

Authentication

Privacy

Integrity

Non-Repudiation

Digital Signature, DMN, IP-chock, and Received Signal Strength