Research Article

Node Location Privacy Protection in Unattended Wireless Sensor Networks

Figure 14

Compare the track-back error hop number (security time) of the four methods at different detectable angles (the specific experimental data are shown in Table 7 in the Appendix).