Research Article
[Retracted] Machine-to-Machine Communication for Device Identification and Classification in Secure Telerobotics Surgery
Figure 8
Performance measurement under DDoS, replay, and eavesdrop attack using EDDC algorithm. (a) Delay. (b) Energy consumption.
(a) |
(b) |