C 2 S 2 -LOOP: Circular Chessboard-Based Secure Source Location Privacy Model Using ECC-ALO in WSN

,


Introduction
WSN is a kind of wireless network that is comprised by a grouping of sensor nodes that can sense, collect, and broadcast information to adjacent nodes through direct communication or relay nodes [1,2]. Source location privacy is an emerging area in event-driven applications such as military and wildlife tracking applications. At any time, the sensor node becomes a source node, and thus when event is detected by a node, the message for a specific event is transmitted to the sink node [3][4][5]. In many cases, the source node can be easily located through the shared wireless transmission medium. Hence, the objective of this source location privacy is to protect the source node location [6]. The safety period is the main concern in SLP, i.e., how long until the node is discovered [7]. To address this concern, several methods have been proposed for SLP in the sensor network. SLP can be classified into the following: flooding-based approach, phantom routing, and fake/dummy messaging approach. Most of the authors have used Random Walk Routing for source location in which nodes are selected in random and adversary/attacker cannot find the source location [8,9]. Previously, dummy message injection method is presented which improves the location privacy but it causes more overhead among sensor nodes [10].
Other approaches are geographic routing, cyclic entrapment, in-network location anonymization, cross-layer routing, separate path routing, network coding, and limit node detectability. These approaches are consuming more energy, large delay, and decreased safety period [11][12][13]. Source node location privacy becomes important for message transmission, but confidentiality of data packets must be ensured through encryption strategy, which is much more necessary to adequately address the problem of source location privacy. Then, we discussed the concepts [14] include safety period, unlikability, identity privacy, timing privacy, route privacy, and contextual privacy. However, context privacy is used for source location identification. Figure 1 indicates the security and privacy of WSN, while Figure 2 shows an example of animal tracking providing a good example of SLP in the sensor network.
1.1. Source Location Privacy. SLP is an important issue and enormous works have been undertaken in this field. A number of attacks related to SLP in WSN. Privacy of source node location is ensured with the use of context protection. Adversaries may use packet tracing to determine the source node location, while the data is being sent from the source to the sink node. However, two adversaries are involved in SLP that is as follows: (i) Local Attacker. This type of attacker can only eavesdrop within range and back-trace the routing path until it reaches the source node (ii) Global Attacker. This type of attacker learns about the whole network traffic and who can make use of temporal consistency and the correlation between packets. Hence, it makes use of the following: Furthermore, the global attacker is near to the sink node of the sensor network and tries to find out the location of the source node of the message [15]. Security is a challenging operation in SLP. Obtaining some parameters such as safety period may improve location privacy, but it may lead to severe issue on the other side such as residual energy. Hence, a balanced trade-off between location privacy and energy consumption is more desirable to obtain high QoS performance and fewer computations in SLP. However, modeling a secure and robust scheme to address these parameters is a difficult process. Very popular routing protocols are required and we need to be augmented these routing protocols with a novel scheme. Energy consumption is still an important issue in accomplishing SLP. To address these issues and show better performance (minimum energy consumption, minimum latency, and maximum safety period) for the source location privacy and easy and flexible network topology management, C 2 S 2 -LOOP provides an efficient solution.   (iv) Transmission of packets from source to sink is done using clockwise and anticlockwise directions for real and fake packets depending on the value of random number R n (v) Before packets transmission from the source node, it will be encrypted using a chaotic artificial neural network and then forwarded to adjacent nodes (vi) We evaluate the performance by a comprehensive set of experimentations for the proposed vs. previous approaches, and our proposed scheme demonstrates the effectiveness and improvement to source location privacy preserving in terms of energy consumption, latency, safety period, and network lifetime The remainder of this paper is as follows: in Section II, we present the state of the art in the field of SLP in WSN. In Section III, we describe the problems and effects of analysis for protecting source location privacy. In Section IV, we present our proposed system model where we elaborate the proposed approach in further detail by presenting subsections. An experiment of the proposed approach is concentrated in Section V, and also, the simulation results obtained by the proposed as well as the previous approaches are described. Section VI concludes our proposed approach, and future directions of this proposed approach are highlighted in Section VII.

State of the Art
Over the last few decades, several vulnerabilities have been determined in terms of SLP in WSN. Protecting source location privacy is not only abundant for preserving source location but also some other metrics have been presented in the current literature. In this section, we present this state of the art.
The authors in [16] presented a dynamic SLP algorithm to achieve a high level of SLP with a high number of messages. The proposed dynamic hybrid approach uses a random walk procedure for packet transmission to the base station and a fake source allocation strategy for energy consumption reduction. A dynamic SLP approach is more energy-efficient, but it is suitable for the deployment of WSN environments. It increases communication overhead since the whole network is dynamic in nature, and also, the hybrid approach is the combination of fake source nodes and random walks, which also increases network overhead and delay. In [17], a differentially private framework-based differential privacy was presented to protect the location of event occurrence. Privacy of event occurrence location is required that requires that an adversary must not able to distinguish between real and dummy traffic messages. The proposed approach produces reduced sensitivity to a single node transmission, which is achieved through real dummy and cumulative reporting to the same event (fake/real events). The first component mechanism generates dummy events to protect source location privacy in which the attacker can easily find the source location by receiving more dummy messages. The authors in [18] proposed a ring-loop routing for a source location privacy scheme in IoT-assisted WSN. It increases the backtracking time of the adversary; a confounding time-domain transmission was introduced to transmit real packets. In addition to Phantom nodes and fake packets transmission, a confounding ring was also utilized to protect the source location privacy. Firstly, real packets are forwarded in the basic ring using confounding timedomain transmission, and secondly, phantom nodes forward using confounding with the shortest path. The proposed scheme is suitable for a local adversary, but it is not suitable for global attackers and it follows the basic ring for packet transmission to the sink node. A multiobjective optimization model was proposed for SLP [19], which is based on two criterions such as pareto efficiency (selection either) and confirm efficiency. A genetic algorithm (GA) was employed to generate Pare-to-Optimal schedules. In addition, two functions were derived in which the main purpose is to minimize total slot usage and also reduces coupled slot usage, which follows the time division multiple access (TDMA) procedure. It directs the predicted attacker path away from the source node. Its advantage is that near-optimal capture radio coupled with path creation that causes no extra messages overhead. This approach was led to high energy consumption and latency. The authors in [20] designed a new protocol called redundancy-based convergence based preserved source location privacy (RBCPSLP) technique in energy harvesting WSN. It improves the privacy preservation by creates as many interference sources. A branch convergence-based SLP preserving strategy was proposed, and hence, routes merge into few routes before arrival at the sink node. In this work, the route is not effective to preserve SLP.
A trace cost-based SLP protection (TCSLP) scheme was proposed in WSN [21]. Initially, authors built a phantom area, which consists of phantom nodes far away from the source node. Then, two routing schemes were integrated (shortest path routing and random walking) for packets transmission, which improves source node location privacy. Phantom node may not be at the right place of the network, which results in the reduction of privacy levels as well as an increment in energy consumption. A new source location privacy protection scheme was proposed in [22], which is implemented in a more practical adversarial model, i.e., smart adversary. This scheme was implemented under both local and global attackers. In order to defend against these adversaries, the authors proposed a lightweight message sharing approach, and then, each message is mapped to a set of shares. Message sharing is not more reliable and scalable for large-scale networks. Energy-efficient and optimum 3 Wireless Communications and Mobile Computing routing is a critical and general issue in WSN. An improved version of routing for WSN was proposed over clusterbased WSN [23]. Initially, a network is divided into number cells, and then, GA is applied to find an optimum number of nodes. To increase the speed of clustering, the k-means algorithm was proposed. Both GA and k-means clustering are time-consuming processes. In [24], the authors presented a dynamic routing scheme for source node location protection. It aims at improving paths for data transmission, and the proposed dynamic routing scheme aims to choose maximum paths for data transmission. Firstly, it selects an initial node from the boundary of the network and every packet traverse by a greedy route and a directed route to the sink node. It causes high complexity and high energy consumption. The authors in [25] focused on SLP by introduced suitable modifications to sensor routing protocols that make it hard for an adversary to backtrack the origin of the source node. This paper jointly considers the issues of energy consumption and location privacy in WSN. The drawbacks of this approach are to lack of security and privacy leakage.
In [26], all-direction routing algorithm (ARR) was proposed for SLP which against parasitic WSN. In ARR, agent nodes are randomly selected in directions by the source nodes based on local decisions rather than knowing the whole topology of the networks. In this work, proper agent node selection is difficult, and it is difficult for agent to transmit packets from the source node to the destination agent node. In [27], the authors proposed two novel methods such as angle protocol for source location (APS) and EAPS (enhanced protocol for source location). These methods adjust dynamically emission radius in routing. APS protocol provides geographically dispersed phantom source nodes and utilizes the energy from energy-abundant regions to create the path. In this work, the dynamical adjustment of node emission radius is complex. Koh et al. [28] have proposed multipath routing named optimal privacy-enhancing routing algorithm (OPERA). The authors have considered global adversary for both lossy and lossless observations that used Bayesian Maximum Posteriori (MAP) estimation scheme. The biggest strength of OPERA is that it provides a good trade-off between energy consumption and privacy but leads to high computational complexity. A novel tree-based diversionary routing scheme was proposed [29] to preserve SLP based on hide-and-seek strategy. The proposed tree-based routing provides strong resistance to reverse trace of the adversary and also resistance to direction-oriented attack. The proposed tree-based routing scheme utilizes remaining energy only at different remote regions and creates diversionary routes as more and then sent to one route in regions near to sink node. A list of nomenclature is shown in Table 1 A confused arc-based SLP scheme was proposed in [30], which is implemented in WSN assisted Internet of Things. The main scope of this paper is to finish packets transmission via random walk based on the node direction. In this scheme, nodes select their next relay nodes in a particular communication range. The proposed scheme is compared with the ring routing, which reduces energy consumption and delays at the expense of safety time for WSN. In this work, the safety period is very less for packet transmission. On the other hand, a K-means clustering scheme based on SLP was proposed in WSN enabled IoT [31]. To protect the source location, fake source nodes are deployed in the network for sensing dummy messages. To increase the safety period, k -means clustering was proposed, which forms clusters. Fake packets are transmitted via fake source nodes to reach the destination node. This scheme is failed to increase the safety period and reduce the latency at minor energy consumption, but lack of security.

Problem Description
We firstly evaluate the effect of overheads (routing and communication between nodes) during SLP using different methods (random walk, fake message transmission, dummy message injection, and so on). Then, we investigate the effect of energy consumption and also considered some optimal ethics for introducing a new scheme for protecting source location information [32]. In [33], a novel chess-board Table 1: List of nomenclature.

Symbol
Meaning Initially, the network is partitioned into two sets and each set operates in an alternating fashion. This CBA has obtained perfect privacy, but it decreases energy cost up to 50% and transmission delay by more than 40%. This method follows a random walk procedure, which is a simple method that increases delay when the probability of adjacent random walk nodes is high. Global attacker can easily capture source node location due to random walk routing (node direction and RSSI). In [34], grid-based cluster methodology was proposed in which the network is divided into a number of clusters. In a grid-based clustered environment, three techniques were proposed such as Dynamic Tree (DT), Dynamic Shortest Path Tree (DSP), and Hybrid Scheme. The proposed hybrid scheme used dummy messages to mislead the adversary since it tracks the source node location, which wastes the energy of sensor nodes. A large packet delay is due to the process of three schemes. Cluster head selection is not effective since it only considers the residual energy of a node. It leads to cluster-based SLP is not effective. A two-phase routing was proposed for SLP [35]. The basic idea behind this routing is to consume less amount of energy with the use of random walks and escape angle (total sequitur angle 2α 1 and escape angle α 1 ). Energy consumption of a node is high since it uses multiple virtual source nodes, and also, this routing scheme delivers the packet to the base station through random-multipaths, and thus, it utilizes an excess amount of energy for transmission to the sink node. A dynamic routing scheme was proposed in [36], which firstly chosen an initial node from the network boundary and every packet is traverse using greedy routing and then used directed route before reaching to the sink node. Event packet is encrypted using a secret key, which is shared between the sink node and the source node. Packets are forwarded through boundary nodes, which consumes more time (number of hops) for packet transmission. In this work, a strong security framework was required which is used for packet encryption and secret key generation. A new scheme called strategic location-based random routing was presented. Here, routing paths are not optimal since it selects random routes which results large delay for packets delivery at the sink node, and also, random nodes are selected by node position, which does not always result in accurate location protection. Energy consumption of the whole network is high due to the packet's transmission through different paths.

C 2 S 2 -Loop System Model
In this section, we describe our proposed model of circular chessboard-based secure routing for SLP. The proposed system architecture is shown in Figure 3.

System
Overview. C 2 S 2 -LOOP is comprised of four entities such as Sensor Nodes (SNs), Cluster Heads (CHs), Global Attacker, and Sink Node (SN). Global attacker used to track the location of the source node, which tends to leak the privacy and also leakage of information. We implement the following operations: (i) key generation, (ii) network topology management, (iii) travel plan, and (iv) data packets encryp-tion. The initial step is held once because it does not need to repeat the process until the transmission range of the network is changed.

Assumptions for C 2 S 2 -LOOP
(1) All sensor nodes are deployed randomly over the circular region with equal initial energy (2) All sensor nodes are homogeneous (nodes having similar functionalities of processing and communication) (3) All sensor nodes are moving randomly at constant speed and location are aware (4) All sensor nodes have a frame header of 104 bits and transmit packet based on time interval (5) Sink is placed at the center of region, which is stationary (6) Adversary (Global Attacker) is near to the sink node of network, which tries to find out the source location (7) It has a global view, and thus, it can view the whole communication patterns of the network 4.3. C 2 S 2 -LOOP Network Setup. In C 2 S 2 -LOOP, the circular region is divided into M circular fields. We consider M = 3, which means the sensor network is divided into three circular fields c 1 , c 2 , c 3 . The radius of circular fields are denoted as r 1 , r 2 , r 3 , and the ratio is 1 : 2 : 3, respectively. We deployed sensor nodes in a circular chessboard c 1 , c 2 , c 3 . However, there are two shapes are identified in chessboard (white and gray). In each gray and white space, we can see a fair distribution of sensor nodes and does not deploy densely. In a circular chessboard, nodes are deployed in the ratio of 1 : 2 : 3. Area a is determined for each circular field is a critical concern due to deployment and location determination. The sensing area for circular field 1 is depicted in Figure 4. The area computation for all c 1 , c 2 , c 3 is as follows: where R is the radius of the circular fields. After sensor nodes deployment, SN i is responsible for executing sensing S T and transmitting data packets D T at time T. The sink node S INK issues public and private keys for all sensor nodes. S INK aggregated all data packets with the packet length S ps through CHs while reducing energy consumption. Other sensor nodes transmit the sensed packets to CH. The process of key generation, network topology management, travel plan, and packet encryption are implemented in many works, but C 2 S 2 -LOOP incurs a large safety period, minimum packet delay, and minimum energy consumption. Improvement of these QoS 5 Wireless Communications and Mobile Computing metrics in the circular chessboard and protecting source location privacy is the main focus of this paper.

Key Generation.
Firstly, registration is performed using ECC with ALO algorithm in which private key and public keys are generated, which is highly secured than the conventional ECC algorithm. ECC is a public-key cryptography system that performs computation by elliptic curve instead of polynomial arithmetic or integer. It provides strong security compared to RSA. Elliptic curve is expressed by an equation of two variables with coefficients. Elliptic curve over real numbers satisfies the set of points, which must satisfy the following equation: where X, Y, a, b are real numbers, applying different sets of values for a and b.
Definition 1. Elliptic curve. The elliptic curve over Z p , p > 3 is the set of all pairs ðX, YÞ ∈ Z p which satisfy   Wireless Communications and Mobile Computing modulo p arithmetic, and the condition is the following For example, a = −4, b = 0:67 gives the elliptic curve with the following equation: However, ECC is demonstrated by two fields such as prime field and binary field. In order to deal with the cryptographic operations, a suitable finite field is selected with contains a large number of points. Some of the benefits of using ECC are as follows: (1) it uses a smaller key size for ciphertexts and signatures, (2) it supports very fast key generation, (3) fast encryption and decryption process than RSA, and (4) for computations, ECC required less memory and CPU cycles than RSA. Therefore, it is suitable for all applications.
Key generation is a significant process where we generate both public key and private key PU K , SE K , respectively. This SE K is generated using the ALO algorithm. ECC key generator description is as follows [37]: where BP is the base point taken from the elliptic group. However, ECC selects private key in a random manner, which leads to the incorrect generation of ciphertext. To mitigate such issues, ALO is proposed for private key generation, and then, the private key and base point are used to generate the public key, written in equation. The process of ALO is described underneath: ALO is a new metaheuristic algorithm released in 2015 by Seyedali Mirjalili [38]. It is based on the behaviors of Ant Lions Hunting mechanism. The major steps involving in ALO for hunting prey are (1) Ants random walk, In ALO, fitness is computed based on SN i coordinates ðx, yÞ, Identity, i.e., PSRN, and current time stamp T S . Hence, it is defined by the following: where f is the fitness value for private key selection. 11) Make random walk and normalize it using eqn.

Network Topology Management.
Network topology is managed by the selection of optimal CH. For CH selection, node residual energy E R is considered.where E I is the initial energy of a node and E i is the energy left after the process of round 1 [39].

Definition 2. Node residual energy.
Node residual energy is the energy left after the process of data transmission. It is denoted as E R , which is computed as follows:

1) Begin 2) Initialize population of Ants and Antlions 3) Compute f for Ants and Antlions 4) Determine the Best_Antlions 5) Consider the current Best_AntLion is the Elite//Optimum Solution 6) While (End Criterion) is fulfilled 7)
For every Ant 8) Select an Antlion via Roulette Wheel strategy 9) Update C and D using following 10) C t = C t /I & D t = D t /I(11) 11) Make random walk and normalize it using eqn. (11) 12) xðtÞ = ½0, cumsum ð2rðt 1 Þ − 1Þ ⋯ cumsumð2rðt n Þ − 1Þ 4.5.1. Cluster Formation. To form clusters, SN i broadcasts hello packet HL P to collect adjacent node information. In each circular field area, SN i presented within the gray and white shape is considered as a cluster.

Cluster Head Selection.
With the passage of time or in other words as the network lifetime increases, the node energy decreases. If CH remains static, it will soon die out of the battery power and will not remain part of the network. Therefore, dynamic CH selection is used. The node with maximum residual energy is elected in each round (SN i having MAX − E R ) as CH. Each individual gray and shape area of nodes involved in the CH election process. This helps in improving the overall life of the network by equally utilizing the energy of all nodes and minimizes the energy hole problem in the network.

Travel Plan.
Before packet transmission, we determine the travel plan between the source node to the sink node, which is not virtual or uses fake source nodes. In this work, we called routing is a travel plan. However, routing is the most fundamental issue in WSN since routing schemes play an important role in WSN. Attackers use the backtracking technique to catch the source node. In backtracking at some node, if the attacker is not able to hear any packet, then it requires to turn back and traverse to other directions. The communication range of the attacker and sensor node is the same. A random number R n is generated by the source node which is compared with the already selected number P n . If the R n ≥ P n , then the real packet is sent in a clockwise direction and a fake packet in anticlockwise direction and vice versa. With the use of a fake path, an attacker cannot find the source location. It requires a greater number of backtracks, and finally, it receives fake packets and we also encrypt the fake messages and forwarded to the fake path. Real packets and fake packets are encrypted in the same manner so that the attacker cannot differentiate between them. It helps to increase the safety period of the network and unable to find the source location.

Data Packets Encryption.
Data packets are encrypted and forwarded using a chaotic artificial neural network where we obtain chaotic sequences as a ciphertext. C-ANN is a combination of two algorithms such as Chaos Theory and Artificial Neural Network. There are several reasons to combine Chaos Theory with ANN: (1) it provides promising and efficient results for encryption and decryption, (2) Imitate function and structure of the human brain to be better, and (3) Chaos theory time series are considered as learning rate in ANN, which provide efficient results. In this work, we proposed a Hop Field Neural Network in ANN. With the use of keys generated using ECC with ALO, packets are encrypted using C-ANN. Pseudocode 2 demonstrates the encryption process of packets using C-ANN. We generate encrypted packets by the following pseudocode.

Performance Evaluation
In this section, we evaluate the performance of C 2 S 2 LOOP by conducting various experiments. Firstly, we demonstrate how the simulations will impact the network performance. Then, we define the parameter description in terms of safety period, latency, energy consumption, total energy consumption, and network lifetime. Lastly, we illustrate the comparison of C 2 S 2 LOOP with previous works.

Simulation Model.
Experiments conducted using the OMNeT++ model which consists of the following four parts: (1) network topology definition (NED) describes the module structure which consists of gates and parameters. It is saved in .ned, (2) message definitions (.msg) in which we can define various message types and insert more data fields; (3) it will convert message definitions into full-fledged C++ classes (.ini); and (4) it consists of simple module sources. They are C++ files with an extension of .h and .cc. The configuration files (omnet.ini, NED) for simulation are depicted in Figures 6 and 7. Figure 8 shows the simulation environment and experiments conducted over Windows 7 (Ultimate-x86) Operating System. The sink node is located at the center of circular region X, Y = 3000m, 3000m. The number of sensor nodes deployed is 200, and nodes are uniformly and randomly distributed over the circular field. Nodes' initial energy level is equipped with 100 J. Some of the parameters used for simulation are given in Table 2.

Case Study: Panda Hunter
Game. This paper provided a case study of SLP for the Panda-Hunter Game model. Sensor nodes are deployed in a large environment to monitor the behavior of Panda. Panda is a source here, which sends messages to the sink node and Hunter is an adversary. Figure 9 pictorial representation of Panda Game is implemented using our proposed model.
The Hunter observes data packets and traces panda location from the sink node same as mentioned in [41,42]. Our 9 Wireless Communications and Mobile Computing SLP goal here is to increase the time required for Hunter to capture the location of the Panda (Safety Period). While sending messages to the sink node, energy usage is an important concern. Some of the functionalities of the Hunter are as follows: (1) it does not interfere with the sensor network, (2) it contains devices to measure Angle of Arriving message, (3) it moves at any rate and unlimited power, and (4) it has a global view of how the network works.

Definition of Simulation Metrics.
In order to estimate the performance of C 2 S 2 LOOP, we consider the following QoS parameters.

Safety Period.
It is the time duration taken to deliver a number of data packets from S to the S INK before global attacker reaches the source location. Hence, this parameter is gauged from the number of packets successfully received at the S INK before tracing of the attacker. It is computed by the following: where S P is the safety period, TðP ðSÞ, PðS INK ÞÞ is the transmission time of packet P sending from S to S INK node, and RðP ðSÞ, PðS INK ÞÞ is the packet received time at S INK node.

Latency.
It is defined as the amount of time duration is taken by a packet to reach its destination from the source to

11
Wireless Communications and Mobile Computing the sink node. The computation of latency is based on the latency of queuing, processing, propagation, and transmission. It is computed by the following: Where L is the latency, TR S−SINK is the time taken for packets transmission from the source node to the sink node, and TS S−SINK is sending time of packets transmitted from the source node to the sink node.

Energy Consumption.
Let consider SN be the set of all nodes present in the network.
Energy consumption E C of SN i is computed by the following: 5.4. Comparative Study. In this section, a comparative study is conducted for the proposed and previous works such as CBA scheme [33], grid-based clustering [34], SLP-R [32], and two-phase routing [35]. Table 3 shows the comparison.

Safety Period Analysis.
In a lot of previous works, source location privacy level is estimated in terms of safety period. It must be higher for better network performance. However, it increases when the distance between S and S INK increases. Previous approaches are failed that achieved poor performance in terms of privacy level. Figure 10 shows safety period analysis for hop count and distance between source node to the sink node. When the hop count increases, the safety period increases. CBA is designed with more privacy criteria for preserving source location privacy since it keeps only homogeneous sensor nodes for network deployment.
The safety period of CBA is closer to our C 2 S 2 LOOP which works well for global attacker and dummy message transmitted through random walk routing. In SLP-R, the source node can transmit a greater number of data packets before reaches the adversary to source origin. Furthermore, two-phase routing and grid-based clusters increase privacy level (safety period), but it decreases while the distance to S and S INK increases. The average safety period regarding of it shows 156.66 s, 159.83 s, 87.5 s, 188.66 s, and 245.16 s for two-phase routing, SLP-R, grid-based clusters, CBA, and the proposed scheme, respectively. Figure 11 indicates the performance of the safety period with respect to the distance between S to S INK . Distance between S to S INK increases gradually for all four previous works considered in this paper. In this case, the position of the source node is varied between 20 and 120 min intervals of 20 m. From the graph, it can be observed that the safety period of the proposed scheme increases as the distance increase compared to previous works. This is due to the fact that we determine the optimum route instead of random walk routing, phantom routing, and fake source routing. If a number of circular field increases, the safety period also increases with the help of distance between S to S INK . The average safety period with respect to distance is 192.85 s, 194.14 s, 105 s, 214.28 s, and 290.42 s for two-phase routing, SLP-R, grid-based clusters, CBA, and the proposed scheme, respectively.

Latency
Analysis. The latency in terms of the number of hop counts taken by the packets transmitted from the S to reach the S INK is depicted in Figure 12. Our proposed approach shows minimal latency while all four previous works show maximal. The minimal delay in the proposed approach can be attributed to the fact that random routing paths are longer and selecting next-hop is not an optimal way. When the degree of randomness of the network is high, hop count is also high. However, we remark that the proposed scheme is best and it can adopt for Delay Tolerant Source Location Privacy Applications where privacy level and latency are sacrificed than previous works. In CBA, packet transmission is delayed due to alternating fashion of 50% nodes in the active stage and 50% of nodes in the sleep stage. Alternating fashion required large computations, and hence, packet delay is high. Figure 13 depicts the performance of latency with respect to distance between S to S INK node. From the plots, it can be seen that the proposed approach causes minimal latency for   Energy consumption to transmit a single bit of data packet is equal to processing 800 instructions. The energy consumption due to transmission of data packets from S to S INK node is depicted in Figure 14. A large energy consumption primarily depends on the hop count the packets take to reach the S INK node from source node S.
The energy consumption of the previous works is the maximum, and we obtained the least for the proposed approach. The reason for this least energy consumption by our proposed approach is as follows: (i) hop count between S to S INK is less in the proposed approach compared to two-phase routing, SLP-R, grid-based clusters, and CBA. (ii) Our proposed approach forward aggregated packets through CH, which reduces large energy consumption than previous works. The average energy consumption for nodesending "n" packets is 935 J, 1010 J, 1250 J, 1041.66 J, and 524 J for two-phase routing, SLP-R, grid-based clusters, CBA, and the proposed approach. 14 Wireless Communications and Mobile Computing

Results Discussion
The efficiency of SLP in WSN is based on QoS requirements. Depends upon routing and network configuration (sensor node deployment and simulation values of each parameter), performance is varied. Energy is one of the important metrics, because sensor nodes are not replaceable and rechargeable. Hence, harvesting in WSN is considered for preserving source location privacy. Our proposed scheme does not harvest since we perform energy-efficient clustering for network management. Table 4 illustrates the comparison between proposed and previous works in terms of average safety period, and latency based on hop count and distance, average energy  The advantages of C 2 S 2 -LOOP are as follows: (i) a large safety period is obtained if the number of circular fields increases, safety period also increases with the aid of our proposed model (key generation, network topology management, travel plan, and packet encryption). (2) Low packet delivery delay from source to the sink node. This is due to our proposed algorithms such as ECC with ALO and chaoticbased ANN algorithm. These algorithms perform speedily and produce accurate and better performance than the earlier works.
(3) C 2 S 2 -LOOP ensures full security and privacy of source node location. (4) In the case of data packet redundancy, energy consumption is minimized using clustering and hence the whole network is managed and also minimizes load at each sensor node. In addition, the individual transmission of packets to sink node is inefficient so a global attacker can be easily tracing packets through adjacent sensors.

Conclusion
In this paper, a novel C 2 S 2 -LOOP scheme is designed to protect the source location privacy in WSN. In SLP, QoS requirements are important such as safety period, packet delay, and energy consumption. Previous works in SLP do not consider all these parameters, which affects the network performance. These parameters are achieved with the aid of our C 2 S 2 -LOOP scheme. C 2 S 2 -LOOP invoked with the following operations: key generation, network topology management, travel plan, and data packets encryption. Sensor nodes authenticated using the elliptic curve ALO algorithm, which selects optimum secret keys, which are verified at the sink node. Next, the network topology is managed by the formation of clusters. In clusters, node residual energy is used for CH election. Intracluster communication is initiated by single-hop and intercluster routing (from source to the sink node) is implemented using clockwise and anticlockwise directions. To ensure data confidentiality, chaotic ANN is used in which data packets are encrypted and transmitted to the next-hop. Extensive experimentation is conducted using the OMNeT ++ network simulator that shows the that proposed C 2 S 2 -LOOP maximizes the safety period while minimizing energy consumption and latency as compared to previous works such as two-phase routing, SLP-R, grid-based clusters, and CBA.

Future Work
In the future, we have planned to extend our research in the following aspects: (i) We deploy IoT sensors for monitoring SLP in realtime applications (disaster monitoring and control). Hence, we combine IoT and WSN environments (ii) We prevent the network from security attacks (spoofing attacks, DoS attacks, and more) (iii) We also protect sink location privacy against both global and local attackers

Data Availability
The data that support the findings of this study are all briefly introduced and all information are available in the manuscript.

Conflicts of Interest
The authors declare that they have no conflicts of interest.