The policy can be one protocol-based, but also a hybrid security. Indeed, most of related works have explored security protocols individually without investigating possibilities and performanceimprovements associated with the integration of a
multi-layer security policy.