Research Article

A Secure Localization Approach Using Mutual Authentication and Insider Node Validation in Wireless Sensor Networks

Figure 3

Location-reference attack variation.
(a) Uncoordinated
(b) Collusion
(c) Pollution