Fig. 13From: Secure and efficient transmission of data based on Caesar Cipher Algorithm for Sybil attack in IoTa Throughput of the network without a Sybil attack. b Performance comparison of the throughputBack to article page