Research Article

A Novel Privacy-Preserving Mobile-Coverage Scheme Based on Trustworthiness in HWSNs

Table 1

Computational comparison of different schemes.

ItemsComputational complexity

The scheme in [29]
The scheme in [30]
MSTW
The scheme in [31]