Figure 7: Simulation attack with 14 genuine nodes and 1 malicious node.