Figure 8From: A Novel Secure Localization Approach in Wireless Sensor Networks Probability of successfully identifying all attacked locators: simulation versus theoretical. Back to article page