Fig. 9From: Energy-efficient privacy-preserving data aggregation protocols based on slicingHidden probability with malicious sensor nodesBack to article page