Property Violated | Attacks | Preventive Measures |
---|---|---|
Privacy | Location trailing | ID based system |
Availability | Denial of Service (DOS) | IP Info. Handling |
Routing attacks | Cryptography Hashing etc. | |
Integrity and confidentiality | Eavesdropping | Creation of cipher |
Replay | Time-stamping | |
Bogus info. | Hashing, Asymmetric cryptography | |
Authenticity | Sybil | Radio resource testing, Registration, Position verification, etc. |
Impersonation | Trust authority, PK1 | |
Timing attack | Encryption solution (TPM) | |
Session hijacking | Encryption, Random SID generation |