Research Article
Localization and Detection of Multiple Attacks in Wireless Sensor Networks Using Artificial Neural Network
Figure 10
Sensor node deployment using distance vector protocol and triangulation process in WSNs.
(a) Clustering and localization of WSNs |
(b) Malicious node localization in WSNs |