Fig. 3From: Energy-efficient and secure mobile node reauthentication scheme for mobile wireless sensor networksOverview of node reauthentication phaseBack to article page