Research Article

Protecting Location Privacy in IoT Wireless Sensor Networks through Addresses Anonymity

Table 1

Power consumption of key operation.

OperationConsumed energy

UMAC/32 hashing0.143 uJ/byte
Tiger/192 hashing0923 uJ/byte
Transmitting5.623 uJ/byte
Receiving6.39 uJ/byte