{"title":"Secure Routing Protocol for Mobile Wireless Sensor Network","authors":"A. H. K. Deva Sarma, B. A. Kar, C. Mall","doi":"10.1109/SAS.2011.5739778","DOIUrl":null,"url":null,"abstract":"In this paper, a novel secure routing protocol is proposed for wireless sensor networks in which sensor nodes as well as the base station are mobile. The protocol achieves security property through symmetric key cryptography and threshold key cryptography. An analysis of the security strengths of the protocol is presented. Simulation results show the throughput of the proposed protocol and a comparison with LEACH regarding its throughput.","PeriodicalId":401849,"journal":{"name":"2011 IEEE Sensors Applications Symposium","volume":"116 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"13","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2011 IEEE Sensors Applications Symposium","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SAS.2011.5739778","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 13
Abstract
In this paper, a novel secure routing protocol is proposed for wireless sensor networks in which sensor nodes as well as the base station are mobile. The protocol achieves security property through symmetric key cryptography and threshold key cryptography. An analysis of the security strengths of the protocol is presented. Simulation results show the throughput of the proposed protocol and a comparison with LEACH regarding its throughput.