Research Article

Supporting Business Privacy Protection in Wireless Sensor Networks

Table 6

Privacy of threat factor nodes in BN.

IDThreat factorState spaceParent nodesChildren nodes

RF_1Skill of attackersHigh, Medium, LowØRF_5
RF_2Vulnerabilities of the WSNHigh, Medium, LowØRF_5
RF_3Motivation of attackersIntensive, WeakØRF_5
RF_4Enterprise security measuresEffective, Average, IneffectiveØRF_6, R1
RF_5Threat of privacy leakage through WSNHigh, Medium, LowRF_1, RF_2, RF_3R1
RF_6Awareness of privacy securityHigh, Medium, LowRF_4R1