Research Article
Protect Mobile Travelers Information in Sensitive Region Based on Fuzzy Logic in IoT Technology
Table 1
Fuzzy rules in algorithm.
| Number of neighbors | Distance to BS | Remaining energy | Protection |
| Low | Low | Low | Medium | Low | Medium | Low | Medium | Low | High | Low | Very low | Low | Low | Medium | Medium | Low | Medium | Medium | Low | Low | High | Medium | Very low | Low | Low | High | Medium | Low | Medium | High | High | Low | High | High | High | Medium | Low | Low | High | Medium | Medium | Low | Medium | Medium | High | Low | Very low | Medium | Low | Medium | High | Medium | Medium | Medium | Medium | Medium | High | Medium | Low | Medium | Low | High | High | Medium | Medium | High | Medium | Medium | High | High | Low | High | Low | Low | Medium | High | Medium | Low | High | High | High | Low | Low | High | Low | Medium | Very high | High | Medium | Medium | High | High | High | Medium | Medium | High | Low | High | Low | High | Medium | High | Low | High | High | High | Very low |
|
|