Return to Article Details One approach to the design of individual mathematical models of security in wireless sensor networks Download Download PDF