2018 6th International Conference on Multimedia Computing and Systems (ICMCS) 2018
DOI: 10.1109/icmcs.2018.8525911
|View full text |Cite
|
Sign up to set email alerts
|

An Optimal and Secure Routing Protocol for Wireless Sensor Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
4
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 6 publications
0
4
0
Order By: Relevance
“…This study [25] proposed an effective, optimized routing path for packet delivery. In this, the cost function of an optimizer is utilized to optimize the routing path based on the remaining energy level and tra c load of a router.…”
Section: Related Workmentioning
confidence: 99%
“…This study [25] proposed an effective, optimized routing path for packet delivery. In this, the cost function of an optimizer is utilized to optimize the routing path based on the remaining energy level and tra c load of a router.…”
Section: Related Workmentioning
confidence: 99%
“…2.1.9 Optimal and secure routing protocol. The proposed protocol by Lazrag et al in Lazrag et al (2018) is a source-initiated protocol, which means that it does not depend on forming a routing table to route traffic. This type of protocol establishes a route from source to destination on demand, maintains it as long as the session is required and then terminates it.…”
Section: Related Work 21 Secure Routing Protocolsmentioning
confidence: 99%
“…Also, their energy consumption is lower than RSA algorithms, which makes them a good fit for WSNs. Lazrag et al (2018) proposed to use ECDSA to authenticate their proposed routing protocol. It has been mentioned in Bernstein et al (2012) that ECDSA has a vulnerability related to its use of a pseudorandom generator to generate secret session keys to sign a given message, which can lead to generating a key for two different messages.…”
Section: The Proposed Solutionmentioning
confidence: 99%
“…It is based on the algebraic structure that uses finite keys. It was firstly proposed in 1985 but has gained importance in current years due to its security strength and key size comparison to other public key security algorithms [12]. ElGamal is a public key cryptography technique proposed by Taher ElGamal and is based on Deffie Hellman Key Exchange (DHKE).…”
mentioning
confidence: 99%