“…In the first category, a small density WSN with 49 nodes, simulation is performed with 4 malicious nodes (1,3,5,7), and then in the next category of simulation, 4 more malicious nodes are added (10,18,21,23), and in the third category further 4 malicious nodes are added (20, 12,15,13). In the end, there are a total of 12 malicious nodes as shown in Fig.1 (a).…”