Review Article

Privacy Models in Wireless Sensor Networks: A Survey

Table 3

Threat analysis.

Eavesdropping/traffic analysis Query revealing Authentication and privacy: tracking (default)/impersonation (when noted)

[44]xx
[39]x
[30]xx
[22]x
[28]x
[25]
[52]xx
[29]x
[31]x
[21]xx
[34]xx
[20]x
[49]x
[53]x
[16]xx
[46]x
[50]x
[35]xx
[54]x
[13]xx
[14]xx
[24]xx
[38]x
[18]xx
[47]x
[48]x
[26]x
[42]xx
[27]x
[45]x
[15]xx
[19]
[32]x
[23]xx
[17]xx x (impersonation)
[43]x
[36] x (impersonation)
[33]x
[37] x (impersonation)
[40]x
[41]