Research Article
Protecting Location Privacy in IoT Wireless Sensor Networks through Addresses Anonymity
Algorithm 3
Circular forwarding against traffic outlining attacks.
(1) | Find the shortest path from the source node to base station according to routing protocol such as dijkstra. | (2) | The base station calculates hops n from source node to base station and requests the node n/2 hops away to initiate a circular forwarding path. | (3) | The selected node broadcasts beacons which includes a counter with initial value n/2. | (4) | All nodes that received the broadcasts decrease the value and forward it. | (5) | All nodes that received the broadcasts with value 0 are candidates for circular forwarding. | (6) | On having data to be sent, the source node selects one of the paths randomly to forward the data to the base station. |
|