Review Article
Privacy Models in Wireless Sensor Networks: A Survey
| | Eavesdropping/traffic analysis | Query revealing | Authentication and privacy: tracking (default)/impersonation (when noted) |
| [44] | x | | x | [39] | | | x | [30] | x | | x | [22] | x | | | [28] | | | x | [25] | | | | [52] | x | | x | [29] | x | | | [31] | x | | | [21] | x | | x | [34] | x | | x | [20] | x | | | [49] | x | | | [53] | x | | | [16] | x | | x | [46] | x | | | [50] | x | | | [35] | x | | x | [54] | x | | | [13] | x | | x | [14] | x | | x | [24] | x | | x | [38] | | | x | [18] | x | | x | [47] | x | | | [48] | x | | | [26] | x | | | [42] | x | | x | [27] | | | x | [45] | x | | | [15] | x | | x | [19] | | | | [32] | | x | | [23] | x | | x | [17] | x | x | x (impersonation) | [43] | x | | | [36] | | | x (impersonation) | [33] | x | | | [37] | | | x (impersonation) | [40] | x | | | [41] | | | |
|
|