Research Article
Protecting Location Privacy in IoT Wireless Sensor Networks through Addresses Anonymity
Table 1
Power consumption of key operation.
| Operation | Consumed energy |
| UMAC/32 hashing | 0.143 uJ/byte | Tiger/192 hashing | 0923 uJ/byte | Transmitting | 5.623 uJ/byte | Receiving | 6.39 uJ/byte |
|
|