Research Article

Protecting Location Privacy in IoT Wireless Sensor Networks through Addresses Anonymity

Algorithm 3

Circular forwarding against traffic outlining attacks.
(1)Find the shortest path from the source node to base station according to routing protocol such as dijkstra.
(2)The base station calculates hops n from source node to base station and requests the node n/2 hops away to initiate a circular forwarding path.
(3)The selected node broadcasts beacons which includes a counter with initial value n/2.
(4)All nodes that received the broadcasts decrease the value and forward it.
(5)All nodes that received the broadcasts with value 0 are candidates for circular forwarding.
(6)On having data to be sent, the source node selects one of the paths randomly to forward the data to the base station.