Fig. 7From: Efficient adaptive framework for securing the Internet of Things devicesAverage throughput results for proposed framework versus greedy and random approachBack to article page