Research Article
Low Complexity Signed Response Based Sybil Attack Detection Mechanism in Wireless Sensor Networks
Figure 9
Power consumption and remaining number of alive nodes as a result of power consumption by participating nodes during the process of authentication in various algorithms.
(a) Indirect validation |
(b) Direct validation |