Fig. 4From: Convolutional technique for enhancing security in wireless sensor networks against malicious nodesHop count v/s packet overheadBack to article page