Employing Keyed Hash Algorithm, Sequential Probability Ratio Test, and Temperature Comparison Test as Security Against Node Capture Attacks of IoT-Based WSNs.
Jhon Aron F. VarcaEarl Nestor T. VelasquezJoseph Bryan G. IbarraPublished in: J. Commun. (2021)