Research Article
Silence is Golden: A Source Location Privacy Scheme for Wireless Sensor Networks Based on Silent Nodes
Algorithm 1
Node receives normal messages.
(1) | receive Normal | | ► generating from the source starts from 1. | | ► is the hop distance of silent nodes from the source to the sink. | (2) | . | (3) | . | (4) | switch do ► is the state transformation approach | (5) | case | (6) | . | (7) | break | (8) | case | (9) | . | (10) | break | (11) | case | (12) | . | (13) | break | (14) | case | (15) | . | (16) | break | (17) | ifthen | (18) | pass ► Discard the received message | (19) | else | (20) | BCAST Normal | (21) | end if |
|