Research Article

A Lightweight Authentication and Key Management Scheme for Wireless Sensor Networks

Figure 5

(a) Successful networking rate with 25 static attackers. (b) Successful networking rate with 25 mobile attackers. (c) Successful networking rate with static and mobile attackers.
(a)
(b)
(c)