Research Article

A Lightweight Authentication and Key Management Scheme for Wireless Sensor Networks

Figure 2

Authentication protocol running example.