Review Article

Privacy Models in Wireless Sensor Networks: A Survey

Table 1

Techniques. (x): technique assumed by authors as already existing.

Encryption Routing Aggregation Packet injection Anonymity/-anonymity/pseudonymity Statistics

[44]xxAnonymity
[39]x
[30]xx
[22]xx
[28]-anonymity
[25]xx
[52]xx
[29]x
[31]xxAnonymity
[21]x
[34]Pseudonymity
[20]xx
[49]xx
[53]x
[16] x (+ ring signature) Pseudonymity
[46]xx
[50]Pseudonymity
[35]x
[54]x
[13](x)(x)
[14]xxPseudonymity
[24]xAnonymity
[38]x
[18](x)xx
[47]x
[48]x
[26]xx
[42]xPseudonymity
[27]xx
[45]xx
[15](x)xx
[19]xxxPseudonymity
[32]x
[23]xxx
[17]xPseudonymity
[43]xx
[36]x
[33]x
[37]x
[40]xxx
[41]xxx