Fig. 2From: Convolutional technique for enhancing security in wireless sensor networks against malicious nodesExample network for evaluating CTBack to article page