Research Article
C2S2-LOOP: Circular Chessboard-Based Secure Source Location Privacy Model Using ECC-ALO in WSN
Pseudocode 1
key generation using ALO.
1) Begin | 2) Initialize population of Ants and Antlions | 3) Compute for Ants and Antlions | 4) Determine the Best_Antlions | 5) Consider the current Best_AntLion is the Elite//Optimum Solution | 6) While (End Criterion) is fulfilled | 7) For every Ant | 8) Select an Antlion via Roulette Wheel strategy | 9) Update and using following | 10) & (11) | 11) Make random walk and normalize it using eqn. (11) | 12) | | 13) Update ant position using | 14) End for | 15) Compute for all | 16) Substitute an Antlion by corresponding ant becomes fitter using eqn | 17) | 18) Update when Antlion fitter than the Elite | 19) End while | 20) Return Elite |
|