Research Article
Localization and Detection of Multiple Attacks in Wireless Sensor Networks Using Artificial Neural Network
Figure 9
The various phases of authentication and registration in the network model for secure data aggregation and transmission in WSNs.
| (a) Beacon node distribution phases |
| (b) Data uploading and retrieval phases |
| (c) Authentication and registration phases in SN, CH, and BS |
| (d) Authentication and registration phases in SN and CH |