Skip to main content
. 2022 Jun 16;22(12):4539. doi: 10.3390/s22124539

Figure 3.

Figure 3

Workflow of the proposed MMTM-RPL framework. The numbers in the figure represent the steps taken for malicious node detection and isolation.