[1]
S. Maidhili R and K. GM, “Authentication and overhearing to prevent internal and external attacks in WSN”, IJET, vol. 7, no. 2.8, pp. 477–487, Mar. 2018, doi: 10.14419/ijet.v7i2.8.10489.