Research Article

A Self-Adaptive Wireless Sensor Network Coverage Method for Intrusion Tolerance Based on Trust Value

Figure 5

Contrast of algorithm optimization.
(a) 10% of nodes suffer the invasion
(b) 20% of nodes suffer the invasion
(c) 30% of nodes suffer the invasion