Research Article

Silence is Golden: A Source Location Privacy Scheme for Wireless Sensor Networks Based on Silent Nodes

Table 2

Time taken for the attacker to capture the source when protectionless flooding is used.

Network size11×1115×1521×2125×25

Time taken (sec)9.9313.9820.4024.59