Fig. 4From: Security to wireless sensor networks against malicious attacks using Hamming residue methodOverhead versus number of hopsBack to article page