Table 2 Attack types, severity levels, and suggested countermeasures.
From: Anomaly detection using machine learning and adopted digital twin concepts in radio environments
Attack Type | Description | Severity | Potential Countermeasure |
|---|---|---|---|
Jamming Attack | Overwhelms the communication channel with noise or signals, preventing legitimate communication. | High | Adaptive frequency hopping or spread spectrum techniques. |
Man-in-the-Middle Attack | Exploits signal reflections or delays to intercept or alter communication. Risks include data theft. | High | Implement signal encryption and route validation protocols. |
Replay attack | Captures legitimate signals and retransmits them to disrupt or confuse the system. | Medium | Increase signal filtering and monitor for abnormal variations. |
Eavesdroppig attack | Exploits weak signals to intercept communication, leading to data leakage and loss of confidentiality | Medium | Enhance encryption and monitor signal consistency. |