Research Article

Localization and Detection of Multiple Attacks in Wireless Sensor Networks Using Artificial Neural Network

Figure 10

Sensor node deployment using distance vector protocol and triangulation process in WSNs.
(a) Clustering and localization of WSNs
(b) Malicious node localization in WSNs