Research Article

Fuzzy-Based Trust Prediction Model for Routing in WSNs

Figure 3

Performance comparison of FTPR, 2-ACKT, GTMS and AODV routing protocols under varying percentage of malicious attacks.
480202.fig.003a
(a)
480202.fig.003b
(b)
480202.fig.003c
(c)
480202.fig.003d
(d)
480202.fig.003e
(e)
480202.fig.003f
(f)