Research Article
An Efficient Anonymous Communication Scheme to Protect the Privacy of the Source Node Location in the Internet of Things
Table 1
Definition of notations in this paper.
| Notation | Definition |
| Rs | The real source node | Ps | The proxy source node | | The secure encryption algorithm | | The secure decryption algorithm | | Initial energy, value 2 | | Threshold distance, value 87 | | Energy consumption, value 50 | | The energy required by the power amplification in the free space channel model, value 10 | | The energy required by the power amplification in the multipath fading channel model, value 0.0013 | | The neighbor node list of node u | | The number of hops from the base station to the current node | | The number of hops from the real source node to the current node | | The minimum number of hops that the node i is away from the base station | | The minimum number of hops that the node i is away from the real source node | | Residual energy of node i |
|
|