Fig. 2From: Security to wireless sensor networks against malicious attacks using Hamming residue methodProtocol diagramBack to article page