Research Article
Research on Wireless Sensor Network Security Location Based on Received Signal Strength Indicator Sybil Attack
Figure 7
Four nodes detect Sybil attacking topology model. (a) 4 detection nodes and 1 Sybil node topology; (b) 4 detection nodes and 2 normal node topologies.
(a) |
(b) |