“…Many of these countermeasures aim to change the traffic pattern in the network to confuse the adversary [12], [13], [14], [15], [16], [17], [18], [19], [20], [21]. Others, e.g., [13], [22], [23], [24], [25], [26], [27], [28], [29], [30], [31], [32], and [33] introduce extra fake packets to hide the data routes and hence lead the adversary to wrong locations. In almost all countermeasures, improving the BS location anonymity comes at the expense of higher transmission rates by the individual nodes.…”