Research Article

Silence is Golden: A Source Location Privacy Scheme for Wireless Sensor Networks Based on Silent Nodes

Algorithm 1

Node receives normal messages.
(1)receive Normal
 ► generating from the source starts from 1.
 ► is the hop distance of silent nodes from the source to the sink.
(2).
(3).
(4)switch do is the state transformation approach
(5)  case
(6)   .
(7)   break
(8)  case
(9)   .
(10)   break
(11)  case
(12)   .
(13)   break
(14)  case
(15)   .
(16)   break
(17)ifthen
(18)  pass ► Discard the received message
(19)else
(20)  BCAST Normal
(21)end if