“…Compromised node [56,57] Battery exhaustion, spoofed/altered/replay messages Detection based on both network and sensor measurements [58], collaborative sensor detection [44,56,57] (Table 2) SQL injection and other database attacks [64,65] Inaccurate database information, breach of data confidentiality Database protection measures VoIP attacks [66,67] Eavesdropping, spoofing, masquerading etc. VoIP security literature [66,68] Weak authentication Unauthorised use, breach of privacy Role based Access Control [69], document encryption [70] Likewise, the protection of EM against cyber threats can be enhanced through strengthening the technology, the processes or the awareness of people involved.…”