Research Article

Localization and Detection of Multiple Attacks in Wireless Sensor Networks Using Artificial Neural Network

Figure 9

The various phases of authentication and registration in the network model for secure data aggregation and transmission in WSNs.
(a) Beacon node distribution phases
(b) Data uploading and retrieval phases
(c) Authentication and registration phases in SN, CH, and BS
(d) Authentication and registration phases in SN and CH