Fig. 5From: Convolutional technique for enhancing security in wireless sensor networks against malicious nodesSimulation time v/s PDRBack to article page