Research Article

An Energy-Efficient Secure Scheme in Wireless Sensor Networks

Figure 11

Hash value duplications according to algorithm execution.