Skip to main content

Table 1 Notations

From: Convolutional technique for enhancing security in wireless sensor networks against malicious nodes

ISC

3-bits initial security code

Hc

Cth hop count

S1c, S2c, S3c

Three bits of ISC at Cth hop

G1c, G2c, G3c

Generated bits at Cth hop

CB

Final security code

N

Total number of initial security bits

Mj

Active nodes

Aj

Attacker nodes

TN

Source node

RN

Destination node

Th

Total number of hops