Review Article
Privacy Models in Wireless Sensor Networks: A Survey
Table 1
Techniques. (x): technique assumed by authors as already existing.
| | Encryption | Routing | Aggregation | Packet injection | Anonymity/-anonymity/pseudonymity | Statistics |
| [44] | | x | | x | Anonymity | | [39] | | x | | | | | [30] | x | x | | | | | [22] | | | x | x | | | [28] | | | | | -anonymity | | [25] | x | | | | | x | [52] | | x | | x | | | [29] | | | | x | | | [31] | | x | x | | Anonymity | | [21] | | x | | | | | [34] | | | | | Pseudonymity | | [20] | | x | | x | | | [49] | x | | x | | | | [53] | x | | | | | | [16] | x (+ ring signature) | | | | Pseudonymity | | [46] | | x | | x | | | [50] | | | | | Pseudonymity | | [35] | | | | x | | | [54] | | | x | | | | [13] | (x) | (x) | | | | | [14] | x | | | x | Pseudonymity | | [24] | | | | x | Anonymity | | [38] | | x | | | | | [18] | (x) | x | | x | | | [47] | | x | | | | | [48] | | | x | | | | [26] | | | x | | | x | [42] | x | | | | Pseudonymity | | [27] | | x | x | | | | [45] | x | | x | | | | [15] | (x) | x | | x | | | [19] | x | x | | x | Pseudonymity | | [32] | x | | | | | | [23] | x | x | | x | | | [17] | x | | | | Pseudonymity | | [43] | x | | x | | | | [36] | x | | | | | | [33] | x | | | | | | [37] | x | | | | | | [40] | x | x | x | | | | [41] | x | x | x | | | |
|
|