From: Convolutional technique for enhancing security in wireless sensor networks against malicious nodes
Hop count (C) | S 1 | S 2 | S 3 | G 1 | G 2 | G 3 | C B |
---|---|---|---|---|---|---|---|
1 | 0 | 0 | 0 | 0 | 0 | 0 | 000000 |
2 | 0 | 0 | 1 | 0 | 0 | 1 | 001001 |
3 | 0 | 1 | 0 | 1 | 0 | 1 | 010101 |
4 | 0 | 1 | 1 | 1 | 0 | 0 | 011100 |
5 | 1 | 0 | 0 | 1 | 1 | 1 | 100111 |
6 | 1 | 0 | 1 | 1 | 1 | 0 | 101110 |
7 | 1 | 1 | 0 | 0 | 1 | 0 | 110010 |
8 | 1 | 1 | 1 | 0 | 1 | 1 | 111011 |