Research Article

Low Complexity Signed Response Based Sybil Attack Detection Mechanism in Wireless Sensor Networks

Figure 9

Power consumption and remaining number of alive nodes as a result of power consumption by participating nodes during the process of authentication in various algorithms.
(a) Indirect validation
(b) Direct validation