Research Article

C2S2-LOOP: Circular Chessboard-Based Secure Source Location Privacy Model Using ECC-ALO in WSN

Pseudocode 2

C-ANN Algorithm.
1) Begin
2) Compute the length of key for encryption
3) Split the key into subsequences of 8 bytes
4) Initialize parameters and the initial point
5) For input message M ()
6) Chaotic Sequence is follows: ,
7) 
//Transforms binary representation
8) Binary Sequence is follows: ,
  
9) 
10)  function