In certain applications, the locations of events reported by a sensor network need to remain anonymous. That is , unauthorized observers must be unable to detect the origin of such events by analyzing the network traffic. Known as the source anonymity problem, this problem has emerged as an important topic in the security of wireless […]