Research Article
A Lightweight Authentication and Key Management Scheme for Wireless Sensor Networks
Figure 5
(a) Successful networking rate with 25 static attackers. (b) Successful networking rate with 25 mobile attackers. (c) Successful networking rate with static and mobile attackers.
(a) |
(b) |
(c) |