Research Article
C2S2-LOOP: Circular Chessboard-Based Secure Source Location Privacy Model Using ECC-ALO in WSN
Table 3
Comparison of proposed and previous approaches for different QoS parameters.
| Method | Description | Parameters | Demerits | | L | |
| CBA scheme | Source location privacy protection scheme is proposed against global attacker | | | | (i) High energy consumption (ii) High delay | Grid-based clusters | The network is divided into number of clusters | | | | (i) Wastage of energy (ii) Large packet delay | SLP-R | Source location privacy using random routing | | | | (i) Increases energy consumption due to random paths (ii) Privacy leakage | Two-phase routing | Escape angles based random walk routing | | | | (i) It utilized an excess amount of energy (ii) Network lifetime suffers due to multiple virtual source nodes |
|
|
|