Review Article

Privacy Models in Wireless Sensor Networks: A Survey

Figure 8

Attacker nature distribution.