Research Article
Node Location Privacy Protection in Unattended Wireless Sensor Networks
Table 7
Compare the track-back error hop number (security time) of the four methods at different detectable angles.
| | Methods | PU SBRF | MoRF | PLAUDIT | MST |
| 30 | 5.00 | 2.59 | 2.68 | 3.91 | 40 | 7.58 | 5.76 | 7.45 | 6.92 | 50 | 10.02 | 6.65 | 7.38 | 7.78 | 60 | | 7.50 | 7.75 | 12.10 | 70 | | | 7.65 | 12.65 | 80 | | | 8.13 | 13.46 | 90 | | | | 13.46 | 100 | | | | 16.35 | 110 | | | | 18.29 | 120 | | | | 18.94 |
|
|