… They should be fault tolerant, should have self-healing capability and high assurance. … Self-enforcing scheme uses asymmetric cryptography such as public key certificates, Diffie-…
CITATION STYLE
Rathore, H. (2016). Case Study: A Review of Security Challenges, Attacks and Trust and Reputation Models in Wireless Sensor Networks. In Mapping Biological Systems to Network Systems (pp. 117–175). Springer International Publishing. https://doi.org/10.1007/978-3-319-29782-8_10
Mendeley helps you to discover research relevant for your work.