Research Article
Localization and Detection of Multiple Attacks in Wireless Sensor Networks Using Artificial Neural Network
Figure 10
Sensor node deployment using distance vector protocol and triangulation process in WSNs.
| (a) Clustering and localization of WSNs |
| (b) Malicious node localization in WSNs |