Review Article

Privacy Models in Wireless Sensor Networks: A Survey

Table 6

Attacker-related assumptions. (): guessed from the text.

Active/passive/both Global/local Static/moving Insider/outsider/both Knowledge Behavior and capabilities Unique/several-independent/colluding

[44]LocalMoving
[39]PassiveInsiderSeveral
[30]
[22]InsiderHonest but curiousSeveral-colluding
[28]GlobalOutsider
[25]PassiveGlobalOutsider
[52]PassiveLocalMovingOutsider
[29]PassiveGlobalOutsider
[31]BothGlobalInsider
[21]PassiveSemiglobalMoving
[34]Passive
[20]PassiveLocalMoving
[49]PassiveLocalInsider
[53]
[16]PassiveGlobal Deployment and protocol-aware Several-colluding
[46]PassiveGlobal Outsider ()
[50]PassiveLocal Outsider () Location for each ID The same communication range as sensors
[35]PassiveGlobalOutsider
[54]PassiveLocalBoth Honest but curious Several-colluding
[13]
[14]BothMultilocalMovingBoth Knows everything except keys and IDs Unlimited resources (memory, processing, energy) Several-colluding
[24]PassiveGlobalOutsider Knows everything except keys and IDs Unlimited resources (memory, processing, energy)
[38]Passive
[18]PassiveGlobalOutsider
[47]
[48]ActiveInsider Honest but curious
[26]InsiderSeveral-colluding
[42]BothGlobal Attacker works when network is already set up
[27]BothBoth
[45]
[15]PassiveGlobalOutsider Knows origin destination for each observed packet Several-colluding (parallel sensor network)
[19]PassiveMultilocal Sink location and crypto mechanism in use
[32]ActiveLocalInsider Honest but curious and dishonest
[23]PassiveLocalMovingOutsider The same communication range as sensors
[17]BothBoth Honest but curious
[43]PassiveBoth
[36]ActiveGlobalBoth
[33]BothLocalBoth
[37]
[40]BothGlobalBoth
[41]BothGlobalBoth