Research Article

Enhanced Key Management Protocols for Wireless Sensor Networks

Figure 4

Using the one-way hash function for source authentication.