I'm an MSc student conducting academic research on how to optimise an authentication protocol in wireless sensor networks. My concern is to know and recognize the best protocol I can select to narrow my work into one single protocol. This is challenging for me to critically understand the most appropriate and suitable protocol I can choose to improve my research work.

More Umar Ibrahim Gumel's questions See All
Similar questions and discussions