Fig. 1From: Convolutional technique for enhancing security in wireless sensor networks against malicious nodesBlock diagram of CT code generatorBack to article page