“…To mitigate such a threat, many countermeasures are proposed to prevent, or at least delay, an adversary from locating the BS. Many of these countermeasures aim to change the traffic pattern in the network to confuse the adversary [12], [13], [14], [15], [16], [17], [18], [19], [20], [21]. Others, e.g., [13], [22], [23], [24], [25], [26], [27], [28], [29], [30], [31], [32], and [33] introduce extra fake packets to hide the data routes and hence lead the adversary to wrong locations.…”