Securing resource-constrained wireless ad hoc networks | IEEE Journals & Magazine | IEEE Xplore