Table 1.
Access Category | Access Opportunity | Access Mechanism | Potential Impact on |
---|---|---|---|
Direct invasive | Theft | In-situ (on-board) probing | - Device type privacy - Specific-device ID privacy - Measurement and log privacy - Bearer privacy |
Direct non-invasive | Theft, Opportunistic | - Direct attachment (USB, serial) - User interface (keypad, LCD) |
- Device type privacy - Specific-device ID privacy - Measurement and log privacy - Bearer privacy |
Remote non-invasive passive | Opportunistic | (Wireless) network access; e.g., interception of data communication | - Device existence privacy - Device type privacy - Specific-device ID privacy - Measurement and log privacy - Bearer privacy |
Remote non-invasive active | Opportunistic | (Wireless) network access; e.g., injection, interruption, replay and modification of data communication | - Specific-device ID privacy - Measurement and log privacy - Bearer privacy |
Visual | Opportunistic | Line of sight | - Device existence privacy - Device type privacy - Specific-device ID privacy |