Skip to main content
. 2016 Nov 10;(1):73–86. doi: 10.15265/IY-2016-025

Table 1.

Device access methods and their impact on privacy.

Access Category Access Opportunity Access Mechanism Potential Impact on
Direct invasive Theft In-situ (on-board) probing - Device type privacy
- Specific-device ID privacy
- Measurement and log privacy
- Bearer privacy
Direct non-invasive Theft, Opportunistic - Direct attachment (USB, serial)
- User interface (keypad, LCD)
- Device type privacy
- Specific-device ID privacy
- Measurement and log privacy
- Bearer privacy
Remote non-invasive passive Opportunistic (Wireless) network access; e.g., interception of data communication - Device existence privacy
- Device type privacy
- Specific-device ID privacy
- Measurement and log privacy
- Bearer privacy
Remote non-invasive active Opportunistic (Wireless) network access; e.g., injection, interruption, replay and modification of data communication - Specific-device ID privacy
- Measurement and log privacy
- Bearer privacy
Visual Opportunistic Line of sight - Device existence privacy
- Device type privacy
- Specific-device ID privacy