Research Article
Localization and Detection of Multiple Attacks in Wireless Sensor Networks Using Artificial Neural Network
Figure 9
The various phases of authentication and registration in the network model for secure data aggregation and transmission in WSNs.
(a) Beacon node distribution phases |
(b) Data uploading and retrieval phases |
(c) Authentication and registration phases in SN, CH, and BS |
(d) Authentication and registration phases in SN and CH |