Research Article

A Secure Localization Approach Using Mutual Authentication and Insider Node Validation in Wireless Sensor Networks

Figure 5

(a) Truthful estimation. (b) Distance reduction. (c) Distance enlargement.
(a)
(b)
(c)