Fig. 5From: Trust evaluation model with entropy-based weight assignment for malicious node’s detection in wireless sensor networksThe detection rate with different percentage of malicious nodesBack to article page