Research Article

C2S2-LOOP: Circular Chessboard-Based Secure Source Location Privacy Model Using ECC-ALO in WSN

Pseudocode 1

key generation using ALO.
1) Begin
2) Initialize population of Ants and Antlions
3) Compute for Ants and Antlions
4) Determine the Best_Antlions
5) Consider the current Best_AntLion is the Elite//Optimum Solution
6) While (End Criterion) is fulfilled
7) For every Ant
8) Select an Antlion via Roulette Wheel strategy
9) Update and using following
10)  & (11)
11) Make random walk and normalize it using eqn. (11)
12)
      
13) Update ant position using
14) End for
15) Compute for all
16) Substitute an Antlion by corresponding ant becomes fitter using eqn
17)
18) Update when Antlion fitter than the Elite
19) End while
20) Return Elite