Research Article
An Efficient Anonymous Communication Scheme to Protect the Privacy of the Source Node Location in the Internet of Things
Table 3
Comparison of security performance.
| Scheme | Source location privacy | Anonymity | Anti-Impersonation | Backtracking attack |
| Random walk | No | No | No | No | GROW | Yes | No | No | Yes | ARPLP | Yes | Yes | No | Yes | Proposed | Yes | Yes | Yes | Yes |
|
|