Research Article

Research on Wireless Sensor Network Security Location Based on Received Signal Strength Indicator Sybil Attack

Figure 8

Two nodes detect Sybil attacking topology model. (a) 2 detection nodes and 1 Sybil node topology; (b) 2 detection nodes and 1 normal node topologies.
(a)
(b)