Research Article
Silence is Golden: A Source Location Privacy Scheme for Wireless Sensor Networks Based on Silent Nodes
Figure 5
Different approaches of state transformation. Nodes in the same string have the same in (a) and (b), and same in (c) and (d). The numbers and arrow denote the temporal sequences of silent nodes to be the silent state. (a) Sink to source. (b) Sink to source and back. (c) Source to sink. (d) Source to sink and back.
(a) |
(b) |
(c) |
(d) |