Research Article
C2S2-LOOP: Circular Chessboard-Based Secure Source Location Privacy Model Using ECC-ALO in WSN
| Symbol | Meaning |
| | No. of circular fields | | Circular identifier | | Area of circular field | | No. of nodes in each circular field | | Sensor nodes | | Sink node | | Hello packet | | No. of clusters | | Cluster head | | Current | | New | | Cluster member | | Sensing time | | Aggregation time | | Packet size for sensor node | | Sensor residual energy | | Plain text | | Ciphertext | | Time stamp | PSRN | Pseudorandom number | | Sensor position | S | Source node | | Private key | | Public key | | Domain parameters | | Base point | | Prime number | | Node with maximum residual energy |
|
|