Research Article
A Self-Adaptive Wireless Sensor Network Coverage Method for Intrusion Tolerance Based on Trust Value
Figure 5
Contrast of algorithm optimization.
(a) 10% of nodes suffer the invasion |
(b) 20% of nodes suffer the invasion |
(c) 30% of nodes suffer the invasion |