Research Article

Network Security Technology of Intelligent Information Terminal Based on Mobile Internet of Things

Figure 6

Comparison of the number of nodes to be captured by a collusion attack when different values of |GSS|.