Review Article

Privacy Models in Wireless Sensor Networks: A Survey

Figure 7

Attacker coverage distribution.