An Identity-based Secure Routing Protocol in WSNs.
Weichang LiHongning LiMin XieShupo BuPublished in: CIS (2011)
Keyphrases
- routing protocol
- key management
- secure routing
- ad hoc networks
- wireless sensor networks
- routing algorithm
- network topology
- key management scheme
- key distribution
- energy aware
- energy consumption
- mobile ad hoc networks
- sensor networks
- data transmission
- wireless ad hoc networks
- energy efficient
- energy efficiency
- multi hop
- resource constrained
- mac protocol
- biological inspired
- routing scheme
- sensor nodes
- base station
- network lifetime
- end to end delay
- network layer
- encryption scheme
- signature scheme
- mobile nodes
- intermediate nodes
- wireless mesh networks
- residual energy
- cooperative
- routing overhead
- ns simulator
- end to end
- data streams