Fig. 7From: Providing trusted data for industrial wireless sensor networksSuccess rate of compromised nodesBack to article page