Figure 4From: Efficient weakly secure network coding scheme against node conspiracy attack based on network segmentationAdvanced scheme of transmission topology design with transmission rate of 3 in WSN system. (a) Network topology. (b) Secure topology when nodes 3, 5, and 8 are malicious nodes. (c) Re-creation mark of network topology.Back to article page