Fig. 5From: Privacy-preserving routing using jointly established protocol in IoT network environmentPerformance analysis in terms of overhead a versus buffer size (MB), b versus time to live (seconds), and c versus simulation time (seconds)Back to article page