Research Article

Trust-Aware and Low Energy Consumption Security Topology Protocol of Wireless Sensor Network

Figure 5

Proportion of malicious nodes and detection accuracy.