Research Article
Supporting Business Privacy Protection in Wireless Sensor Networks
Table 3
Motivation of attacker.
| | Level | Definition |
| | Weak | Out of curiosity or having no obvious motivation | | Intensive | Having a strong desire to attack to benefit from valuable privacy |
|
|