Login / Signup

Employing Keyed Hash Algorithm, Sequential Probability Ratio Test, and Temperature Comparison Test as Security Against Node Capture Attacks of IoT-Based WSNs.

Jhon Aron F. VarcaEarl Nestor T. VelasquezJoseph Bryan G. Ibarra
Published in: J. Commun. (2021)
Keyphrases
  • learning algorithm
  • tree structure
  • key management
  • node selection