PHJ Nardelli, H Alves, CHM de Lima, M Latva-aho - Computer Networks, 2016 - infona.pl
This paper analyzes the achievable throughput of multi-hop sensor networks for industrial
applications under a secrecy constraint and malicious jamming. The evaluation scenario …