Research Article
Node Location Privacy Protection in Unattended Wireless Sensor Networks
Algorithm 1
Message security transmission algorithm.
| INPUT: : start sensor node; k: the maximum number of loops passed; | | : routing probability; : the centripetal node set of ; | | : the centrifuge node set of ; : the loop-left (or -right) node set of ; | | , : the corresponding Vcell and Gcell in which is located; | | : random function; | | OUTPUT: target sensor node; | | PROCEDURE: | (1) | while do | (2) | ; | (3) | if then | (4) | if & then | (5) | randomly choose a node from , let | (6) | else | (7) | randomly choose a node from , let | (8) | if then | (9) | let be the subset that is bigger than | (10) | | (11) | else | (12) | let be the subset that is smaller than | (13) | | (14) | else | (15) | let ’s state be 0 | (16) | randomly choose a node from , let | (17) | if then | (18) | let be the subset that is smaller than | (19) | | (20) | else | (21) | let be the subset that is bigger than | (22) | | (23) | return nj |
|