Research Article

Optimized Scheme to Secure IoT Systems Based on Sharing Secret in Multipath Protocol

Figure 7

End-to-end delay graph.