Skip to main content
. 2010 Oct 22;10(10):9529–9540. doi: 10.3390/s101009529

Figure 5.

Figure 5.

A simple example for secure path in WSN.