Research Article

Optimization of Wireless Sensor Network Architecture with Security System

Figure 9

The proportion of malicious data packets in the total received packets and the ability to withstand the attack of malicious cluster heads.