Research Article
Research on Wireless Sensor Network Security Location Based on Received Signal Strength Indicator Sybil Attack
Figure 8
Two nodes detect Sybil attacking topology model. (a) 2 detection nodes and 1 Sybil node topology; (b) 2 detection nodes and 1 normal node topologies.
(a) |
(b) |