Table 2 Attack types, severity levels, and suggested countermeasures.

From: Anomaly detection using machine learning and adopted digital twin concepts in radio environments

Attack Type

Description

Severity

Potential Countermeasure

Jamming Attack

Overwhelms the communication channel with noise or signals, preventing legitimate communication.

High

Adaptive frequency hopping or spread spectrum techniques.

Man-in-the-Middle Attack

Exploits signal reflections or delays to intercept or alter communication. Risks include data theft.

High

Implement signal encryption and route validation protocols.

Replay attack

Captures legitimate signals and retransmits them to disrupt or confuse the system.

Medium

Increase signal filtering and monitor for abnormal variations.

Eavesdroppig attack

Exploits weak signals to intercept communication, leading to data leakage and loss of confidentiality

Medium

Enhance encryption and monitor signal consistency.