Research Article

A Self-Adaptive Wireless Sensor Network Coverage Method for Intrusion Tolerance Based on Trust Value

Figure 6

The process of convergence when the node suffers invasion.