Research Article

A Secure Localization Approach Using Mutual Authentication and Insider Node Validation in Wireless Sensor Networks

Figure 6

Comparison of localization ratio: (a) impact of malicious nodes and (b) impact of anchor nodes.
(a)
(b)