Y Li - … Journal of Innovative Computing, Information and …, 2021 - ijicic.org
Generally speaking, different source location protection strategies have played an important
role in protecting location security of source nodes, and prolonged attackers' time to locate …