Research Article

Research on Wireless Sensor Network Security Location Based on Received Signal Strength Indicator Sybil Attack

Figure 7

Four nodes detect Sybil attacking topology model. (a) 4 detection nodes and 1 Sybil node topology; (b) 4 detection nodes and 2 normal node topologies.
(a)
(b)