Fig. 6From: Trust evaluation model with entropy-based weight assignment for malicious node’s detection in wireless sensor networksThe false alarm rate with different percentage of malicious nodesBack to article page