| Attacks | |||
| External and Internal Attacks | |||
| Active and passive attacks | |||
| Stalling classification of routing attacks | Modification of attacks | ||
| Interception attacks | |||
| Fabrication attacks | |||
| Interruption attacks | |||
| Layer Wise Network attacks | Physical Layer attacks | Eaves Dropping | |
| Jamming attacks | |||
| Active interference Attacks | |||
| Data/Mac Layer attacks | Selfish Nodes behavior | ||
| Malicious nodes behavior | DoS Attacks | ||
| Attacks on network integrity | |||
| Attacking neighbor sensing protocols | |||
| Traffic Analysis | |||
| Network Layer Attacks | Black hole attacks | ||
| Rushing Attacks | |||
| Warm hole attacks | |||
| Sinkhole Attacks | |||
| Replay attacks | |||
| Link withholding and spoofing attacks | |||
| Resource consumption attacks | |||
| Sybill Attacks | |||
| Byzantine Attacks | |||
| Transport Layer Attacks | Session Hijacking | ||
| SYN Flooding Attacks | |||
| Application Layer | Malicious code Attacks | ||
| Repudiation Attacks | |||