[PDF][PDF] N-tier modelling of robust key management for secure data aggregation in wireless sensor network

J Metan, KNN Murthy - International …, 2019 - download.garuda.kemdikbud.go.id
Security problems in Wireless Sensor Network (WSN) have been researched from more
than a decade. There are various security approaches being evolving towards resisting …

n-Tier Modelling of Robust Key management for Secure Data Aggregation in Wireless Sensor Network

J Metan, KNN Murthy - garuda.kemdikbud.go.id
Abstract Security problems in Wireless Sensor Network (WSN) have been researched from
more than a decade. There are various security approaches being evolving towards …

[PDF][PDF] N-tier modelling of robust key management for secure data aggregation in wireless sensor network

J Metan, KNN Murthy - International Journal of Electrical and …, 2019 - academia.edu
Security problems in Wireless Sensor Network (WSN) have been researched from more
than a decade. There are various security approaches being evolving towards resisting …

[PDF][PDF] N-tier modelling of robust key management for secure data aggregation in wireless sensor network

J Metan, KNN Murthy - International Journal of Electrical and Computer …, 2019 - core.ac.uk
Security problems in Wireless Sensor Network (WSN) have been researched from more
than a decade. There are various security approaches being evolving towards resisting …

n-Tier Modelling of Robust Key management for Secure Data Aggregation in Wireless Sensor Network

J Metan, KNN Murthy - International Journal of Electrical and …, 2019 - search.proquest.com
Abstract Security problems in Wireless Sensor Network (WSN) have been researched from
more than a decade. There are various security approaches being evolving towards …

N-tier modelling of robust key management for secure data aggregation in wireless sensor network.

J Metan, KN Murthy - International Journal of Electrical & …, 2019 - search.ebscohost.com
Abstract Security problems in Wireless Sensor Network (WSN) have been researched from
more than a decade. There are various security approaches being evolving towards …