Skip to main content
. 2019 Feb 25;19(4):970. doi: 10.3390/s19040970

Figure 1.

Figure 1

The malicious node in a backpressure (BP) routing algorithm.