Research Article
Supporting Business Privacy Protection in Wireless Sensor Networks
Table 6
Privacy of threat factor nodes in BN.
| ID | Threat factor | State space | Parent nodes | Children nodes |
| RF_1 | Skill of attackers | High, Medium, Low | Ø | RF_5 | RF_2 | Vulnerabilities of the WSN | High, Medium, Low | Ø | RF_5 | RF_3 | Motivation of attackers | Intensive, Weak | Ø | RF_5 | RF_4 | Enterprise security measures | Effective, Average, Ineffective | Ø | RF_6, R1 | RF_5 | Threat of privacy leakage through WSN | High, Medium, Low | RF_1, RF_2, RF_3 | R1 | RF_6 | Awareness of privacy security | High, Medium, Low | RF_4 | R1 |
|
|