Fig. 1From: Security to wireless sensor networks against malicious attacks using Hamming residue methodMulti-hop network with rival nodeBack to article page