Research Article
Supporting Business Privacy Protection in Wireless Sensor Networks
Table 3
Motivation of attacker.
| Level | Definition |
| Weak | Out of curiosity or having no obvious motivation | Intensive | Having a strong desire to attack to benefit from valuable privacy |
|
|