Review Article
Privacy Models in Wireless Sensor Networks: A Survey
| | Location privacy: source/sink/both | Data confidentiality | Anonymity | Access control | Authentication |
| [44] | Both | | | | | [39] | Source | | | | | [30] | | x (query) | | | | [22] | | x (sensor data) | | | | [28] | Source | | | | | [25] | | | x (source) | | | [52] | Sink | | | | | [29] | | x (events) | | | | [31] | | x (query) | x (aggregator) | | | [21] | Source | | | | | [34] | | | x | | | [20] | Source | | | | | [49] | | x | | | | [53] | | x | | | | [16] | | x (events) | | | | [46] | Source | | | | | [50] | Source | | | | | [35] | | | x (source) | | | [54] | | x | | | | [13] | | | | x | | [14] | Both | | | | | [24] | Source | | | | | [38] | Source | | | | | [18] | Source | | | | | [47] | Both | | | | | [48] | | | | | | [26] | | x | | | | [42] | Source | | | | | [27] | Sink | | | | | [45] | | | | | | [15] | Both | | | | | [19] | Source | | | | | [32] | | x (query and query results) | | | x | [23] | Source | | | | | [17] | | | | x (query and query results) | | [43] | | | | | | [36] | | | | | x | [33] | | | | x (query and query results) | | [37] | | | | | x | [40] | | x | | | | [41] | | | | | |
|
|