Research Article
Node Location Privacy Protection in Unattended Wireless Sensor Networks
Figure 14
Compare the track-back error hop number (security time) of the four methods at different detectable angles (the specific experimental data are shown in Table 7 in the Appendix).