Skip to main content
. 2021 Oct 13;21(20):6815. doi: 10.3390/s21206815

Figure 4.

Figure 4

The time overhead of different security management and control schemes in sensor networks.