Research Article
A UAV-Aided Cluster Head Election Framework and Applying Such to Security-Driven Cluster Head Election Schemes: A Survey
Figure 4
General operation of the symmetric cryptography scheme. (a) Group key generation. (b) CH election procedure in each round.
(a) |
(b) |