Fig. 3From: Security to wireless sensor networks against malicious attacks using Hamming residue methodPDR versus simulation time (s)Back to article page