Research Article

Node Location Privacy Protection in Unattended Wireless Sensor Networks

Figure 8

The flowchart of Algorithm 1.