Attacks | Security Requirements | Countermeasures |
DoS | Availability | Switching Options, APDA, RRDA, IP-chock, and DMN |
Sybil | Authentication Availability | RRDA, IP-chock, Received Signal Strength, Footprint, Resemblance of the neighboring nodes, and DMN |
Information Disclosure | Privacy | PLPCA, LESPP, and Digital Signature |
Suppression/Alteration | Availability Integrity | Digital Signature, and DMN |
Impersonation/Masquerading | Authentication Privacy Integrity Non-Repudiation | Digital Signature, DMN, IP-chock, and Received Signal Strength |