Figure 6From: Broadcast Secrecy via Key-Chain-Based Encryption in Single-Hop Wireless Sensor Networks Power consumption trace when transfering program "Pong" using Deluge. Back to article page