Fig. 2From: Clustering and reliability-driven mitigation of routing attacks in massive IoT systemsClusters configurationBack to article page