[1]
Maidhili R, S. and GM, K. 2018. Authentication and overhearing to prevent internal and external attacks in WSN. International Journal of Engineering & Technology. 7, 2.8 (Mar. 2018), 477–487. DOI:https://doi.org/10.14419/ijet.v7i2.8.10489.