Skip to main content
. 2022 Jun 16;22(12):4539. doi: 10.3390/s22124539

Figure 4.

Figure 4

Figure 4

Comparison of network lifetime for different attacks: (a) Rank attack, (b) Sybil attack, and (c) Sinkhole attack.