Research Article

Security Analysis and Improvements of Session Key Establishment for Clustered Sensor Networks

Figure 6

Procedures 1 and 2 in Lee and Kim’s scheme (redrawn from [17]).