“…Several works have already formally studied routing protocol and security scheme. 12,25,28,35 The protocol used in this paper is based on AODV, AODMV, and its variants 2-4,6,7,10,11 in terms of routing aspects. For the security aspect, the technique used is based on μTESLA.…”