W Zhou, B Yu - KSII Transactions on Internet and Information …, 2018 - koreascience.kr
Considering the topology of hierarchical tree structure, each cluster in WSNs is faced with
various attacks launched by malicious nodes, which include network eavesdropping …