Authentication of the Message through Hop-by-Hop and Secure the Source Nodes in Wireless Sensor Networks

B. Anil Kumar, N. Bhaskara Rao, M. S. Sunitha. Authentication of the Message through Hop-by-Hop and Secure the Source Nodes in Wireless Sensor Networks. In Suresh Chandra Satapathy, Bhabendra Narayan Biswal, Siba K. Udgata, J. K. Mandal, editors, Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2014 - Volume 2, Bhubaneswar, Odisa, India, 14-15 November 2014. Volume 328 of Advances in Intelligent Systems and Computing, pages 785-791, Springer, 2014. [doi]

@inproceedings{KumarRS14-0,
  title = {Authentication of the Message through Hop-by-Hop and Secure the Source Nodes in Wireless Sensor Networks},
  author = {B. Anil Kumar and N. Bhaskara Rao and M. S. Sunitha},
  year = {2014},
  doi = {10.1007/978-3-319-12012-6_87},
  url = {http://dx.doi.org/10.1007/978-3-319-12012-6_87},
  researchr = {https://researchr.org/publication/KumarRS14-0},
  cites = {0},
  citedby = {0},
  pages = {785-791},
  booktitle = {Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2014 - Volume 2, Bhubaneswar, Odisa, India, 14-15 November 2014},
  editor = {Suresh Chandra Satapathy and Bhabendra Narayan Biswal and Siba K. Udgata and J. K. Mandal},
  volume = {328},
  series = {Advances in Intelligent Systems and Computing},
  publisher = {Springer},
  isbn = {978-3-319-12011-9},
}