Research Article

A Novel Privacy-Preserving Mobile-Coverage Scheme Based on Trustworthiness in HWSNs

Algorithm 1

Mobile scheme based on the trustworthiness.
1: Input: Static nodes and mobile nodes , in which and an initial rectangular region, coverage difference accuracy , communication radius , sensing radius , , iterations G, all network sensor nodes initialization trust .
2: Output: The mobile sensor nodes trust set and the network coverage p.
3: fordo
4:  According to the virtual force and voronoi theory, the combined force of mobile nodes in a rectangular region is calculated.
5:  Select ; Where there are first generation pollution nodes in the network.
6:  while, stop.
7:  Calculate the mobile nodes trust .
8:  Select to move for avoiding the high-risk area and improving the network coverage p.
9: end for