Skip to main content
. 2019 Sep 17;19(18):4007. doi: 10.3390/s19184007

Figure 11.

Figure 11

The power consumption of the nodes under the deauthentication attack.