The transport layer controls the reliability of a given link through flow control, segmentation and de-segmentation, and error control.
Some protocols are state- and connection-oriented.
This means that the transport layer can keep track of the segments and retransmit those that fail.
The attacks that can be launched on the transport layer in a WSN are
flooding attack and
de-synchronization attack
Flooding - Whenever a protocol is required to maintain state at either end of a connection,
It becomes vulnerable to memory exhaustion through flooding.
An attacker may repeatedly make new connection request
until the resources required by each connection are exhausted or reach a maximum limit.
In either case, further legitimate requests will be ignored.
Смотрите видео Transport Layer Attacks, Application Layer attacks and its solution in WSN онлайн без регистрации, длительностью часов минут секунд в хорошем качестве. Это видео добавил пользователь deva Sena 24 Ноябрь 2022, не забудьте поделиться им ссылкой с друзьями и знакомыми, на нашем сайте его посмотрели 96 раз и оно понравилось 1 людям.