Skip to main content
. 2014 Jun 10;14(6):10081–10106. doi: 10.3390/s140610081

Figure 6.

Figure 6.

A sensor energy exhausting attack on Shi et al.'s protocol.