Research Article

Security Analysis and Improvements of Session Key Establishment for Clustered Sensor Networks

Figure 2

Hash chain generation in the proposed scheme.