From: Convolutional technique for enhancing security in wireless sensor networks against malicious nodes
ISC | 3-bits initial security code |
Hc | Cth hop count |
S1c, S2c, S3c | Three bits of ISC at Cth hop |
G1c, G2c, G3c | Generated bits at Cth hop |
CB | Final security code |
N | Total number of initial security bits |
Mj | Active nodes |
Aj | Attacker nodes |
TN | Source node |
RN | Destination node |
Th | Total number of hops |