{"title":"移动无线传感器网络的安全路由协议","authors":"A. H. K. Deva Sarma, B. A. Kar, C. Mall","doi":"10.1109/SAS.2011.5739778","DOIUrl":null,"url":null,"abstract":"In this paper, a novel secure routing protocol is proposed for wireless sensor networks in which sensor nodes as well as the base station are mobile. The protocol achieves security property through symmetric key cryptography and threshold key cryptography. An analysis of the security strengths of the protocol is presented. Simulation results show the throughput of the proposed protocol and a comparison with LEACH regarding its throughput.","PeriodicalId":401849,"journal":{"name":"2011 IEEE Sensors Applications Symposium","volume":"116 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"13","resultStr":"{\"title\":\"Secure Routing Protocol for Mobile Wireless Sensor Network\",\"authors\":\"A. H. K. Deva Sarma, B. A. Kar, C. Mall\",\"doi\":\"10.1109/SAS.2011.5739778\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this paper, a novel secure routing protocol is proposed for wireless sensor networks in which sensor nodes as well as the base station are mobile. The protocol achieves security property through symmetric key cryptography and threshold key cryptography. An analysis of the security strengths of the protocol is presented. Simulation results show the throughput of the proposed protocol and a comparison with LEACH regarding its throughput.\",\"PeriodicalId\":401849,\"journal\":{\"name\":\"2011 IEEE Sensors Applications Symposium\",\"volume\":\"116 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2011-03-28\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"13\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2011 IEEE Sensors Applications Symposium\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/SAS.2011.5739778\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2011 IEEE Sensors Applications Symposium","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SAS.2011.5739778","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Secure Routing Protocol for Mobile Wireless Sensor Network
In this paper, a novel secure routing protocol is proposed for wireless sensor networks in which sensor nodes as well as the base station are mobile. The protocol achieves security property through symmetric key cryptography and threshold key cryptography. An analysis of the security strengths of the protocol is presented. Simulation results show the throughput of the proposed protocol and a comparison with LEACH regarding its throughput.