Figure 2From: A Novel Secure Localization Approach in Wireless Sensor NetworksState transitions of the sensor in a WSN under the distance-consistent spoofing attack. and denote the safe state and attacked state, respectively.Back to article page