Review Article
Privacy Models in Wireless Sensor Networks: A Survey
Table 6
Attacker-related assumptions. (
): guessed from the text.
| | Active/passive/both | Global/local | Static/moving | Insider/outsider/both | Knowledge | Behavior and capabilities | Unique/several-independent/colluding |
| [44] | | Local | Moving | | | | | [39] | Passive | | | Insider | | | Several | [30] | | | | | | | | [22] | | | | Insider | | Honest but curious | Several-colluding | [28] | | Global | | Outsider | | | | [25] | Passive | Global | | Outsider | | | | [52] | Passive | Local | Moving | Outsider | | | | [29] | Passive | Global | | Outsider | | | | [31] | Both | Global | | Insider | | | | [21] | Passive | Semiglobal | Moving | | | | | [34] | Passive | | | | | | | [20] | Passive | Local | Moving | | | | | [49] | Passive | Local | | Insider | | | | [53] | | | | | | | | [16] | Passive | Global | | | | Deployment and protocol-aware | Several-colluding | [46] | Passive | Global | | Outsider () | | | | [50] | Passive | Local | | Outsider () | Location for each ID | The same communication range as sensors | | [35] | Passive | Global | | Outsider | | | | [54] | Passive | Local | | Both | | Honest but curious | Several-colluding | [13] | | | | | | | | [14] | Both | Multilocal | Moving | Both | Knows everything except keys and IDs | Unlimited resources (memory, processing, energy) | Several-colluding | [24] | Passive | Global | | Outsider | Knows everything except keys and IDs | Unlimited resources (memory, processing, energy) | | [38] | Passive | | | | | | | [18] | Passive | Global | | Outsider | | | | [47] | | | | | | | | [48] | Active | | | Insider | | Honest but curious | | [26] | | | | Insider | | | Several-colluding | [42] | Both | Global | | | | Attacker works when network is already set up | | [27] | Both | | | Both | | | | [45] | | | | | | | | [15] | Passive | Global | | Outsider | Knows origin destination for each observed packet | | Several-colluding (parallel sensor network) | [19] | Passive | Multilocal | | | Sink location and crypto mechanism in use | | | [32] | Active | Local | | Insider | | Honest but curious and dishonest | | [23] | Passive | Local | Moving | Outsider | | The same communication range as sensors | | [17] | Both | | | Both | | Honest but curious | | [43] | Passive | | | Both | | | | [36] | Active | Global | | Both | | | | [33] | Both | Local | | Both | | | | [37] | | | | | | | | [40] | Both | Global | | Both | | | | [41] | Both | Global | | Both | | | |
|
|