Research Article
Node Location Privacy Protection in Unattended Wireless Sensor Networks
Figure 2
Bidirectional node location attack (BDLA) scheme procedure. (a) Location sampling. (b) Line fitting. (c) SINK estimation without denoising. (d) SINK estimation with denoising. (e) Source node estimation without denoising. (f) Source node estimation with denoising.
(a) |
(b) |
(c) |
(d) |
(e) |
(f) |