Research Article

C2S2-LOOP: Circular Chessboard-Based Secure Source Location Privacy Model Using ECC-ALO in WSN

Table 1

List of nomenclature.

SymbolMeaning

No. of circular fields
Circular identifier
Area of circular field
No. of nodes in each circular field
Sensor nodes
Sink node
Hello packet
No. of clusters
Cluster head
Current
New
Cluster member
Sensing time
Aggregation time
Packet size for sensor node
Sensor residual energy
Plain text
Ciphertext
Time stamp
PSRNPseudorandom number
Sensor position
SSource node
Private key
Public key
Domain parameters
Base point
Prime number
Node with maximum residual energy