Return to Article Details To Identify the Untrustworthy Leader of a Hierarchical Wireless Sensor Network Using Received Signal Strength Download Download PDF