Skip to main content
. 2021 Sep 12;21(18):6116. doi: 10.3390/s21186116

Figure 15.

Figure 15

The result of calculating the entropy for received packets by node i relative to node j (marked in yellow) and by node j relative to node i (marked in orange) under conditions of a deauthentication attack.