Skip to main content
. 2021 Sep 12;21(18):6116. doi: 10.3390/s21186116

Figure 14.

Figure 14

The result of calculating the entropy for: (a) received packets; and (b) packets sent by node i relative to node j (marked in blue) and by node j relative to node i (marked in orange) under conditions of a deauthentication attack.