Return to Article Details An Approach on Detecting Malicious Nodes in Distributed Sensor Networks Download Download PDF