Research Article
[Retracted] Machine-to-Machine Communication for Device Identification and Classification in Secure Telerobotics Surgery
Figure 7
Performance measurement under DDoS, replay, and eavesdrop attack using ECFU algorithm. (a) Delay. (b) Energy consumption.
(a) |
(b) |