Research Article
C2S2-LOOP: Circular Chessboard-Based Secure Source Location Privacy Model Using ECC-ALO in WSN
1) Begin | 2) Compute the length of key for encryption | 3) Split the key into subsequences of 8 bytes | 4) Initialize parameters and the initial point | 5) For input message M () | 6) Chaotic Sequence is follows: , … | 7) | //Transforms binary representation | 8) Binary Sequence is follows: , … | | 9) | 10) function |
|