Figure 3From: A Novel Secure Localization Approach in Wireless Sensor Networks Theoretical analysis of the mathematical probability under the distance-consistent spoofing attack. Back to article page