Research Article

C2S2-LOOP: Circular Chessboard-Based Secure Source Location Privacy Model Using ECC-ALO in WSN

Table 3

Comparison of proposed and previous approaches for different QoS parameters.

MethodDescriptionParametersDemerits
L

CBA schemeSource location privacy protection scheme is proposed against global attacker(i) High energy consumption
(ii) High delay
Grid-based clustersThe network is divided into number of clusters(i) Wastage of energy
(ii) Large packet delay
SLP-RSource location privacy using random routing(i) Increases energy consumption due to random paths
(ii) Privacy leakage
Two-phase routingEscape angles based random walk routing(i) It utilized an excess amount of energy
(ii) Network lifetime suffers due to multiple virtual source nodes

, ,