Skip to main content
. 2020 Feb 18;20(4):1108. doi: 10.3390/s20041108

Figure 10.

Figure 10

(a) Packet delivery ratio and (b) energy consumption in the case of Gray-hole attack by varying number of malicious nodes.