Research Article

Node Location Privacy Protection in Unattended Wireless Sensor Networks

Figure 2

Bidirectional node location attack (BDLA) scheme procedure. (a) Location sampling. (b) Line fitting. (c) SINK estimation without denoising. (d) SINK estimation with denoising. (e) Source node estimation without denoising. (f) Source node estimation with denoising.
(a)
(b)
(c)
(d)
(e)
(f)