Design and Develop ECC for Wireless Sensor Network

  title={Design and Develop ECC for Wireless Sensor Network},
  author={Bhisham Sharma and Yogesh Kumar and Vandana Ladha},
  journal={International Journal of Computer Applications},
Wireless Sensor Networks consist of sensor nodes and few powerful control mobile laptops performing activities like routing, data aggregation etc over wireless media. These kinds of networks are getting popular these days because of small size, ease of handle and installation. Because of this property they are used in environment like military, hospitals, weather forecasting etc. for processing critical information. However such kind of environment is more prone to “Man In the Middle Attack… 
2 Citations
An affinity analysis based CIM-to-PIM transformation
A Business-Process-based CIM modelling method and a CIM-to-PIM transformation approach that can ensure model integrity and increase the degree of model transformation automation are proposed.
Delineation of potential ground water-bearing zones in the Barind tract of West Bengal, India
  • R. Das, Swades Pal
  • Environmental Science
    Environment, Development and Sustainability
  • 2016
The Barind tract of West Bengal is an area of tropical sub-humid region composed of old alluvial soil. The area has high water demand due to growing population pressure and intensification in


Analysis of Public-Key Cryptography for Wireless Sensor Networks Security
This paper surveys well known security issues in WSNs and studies the behavior of WSN nodes that perform public key cryptographic operations and evaluates time and power consumption of public key cryptography algorithm for signature and key management by simulation.
Smartening the environment using wireless sensor networks in a developing country
The prospects of wireless sensor networks are explored and a design level framework for developing a smart environment using WSNs is proposed, which could be beneficial for a developing country like Bangladesh.
Wireless sensor networks
The state-of-the-art protocol for WSN protocol stack is explored for transport, routing, data link and physical layers, and the open research issues are discussed for each of the protocol layers.
Introduction to Modern Cryptography
This book discusses Private-Key (Symmetric) Cryptography, Number Theory and Cryptographic Hardness Assumptions, and the Random-Oracle Model in Detail.
  • Journal of Next-Generation NetworksIJNGN),Vol.1,
  • 2009
Analysis of Public Key Cryptography
  • World Academy of Science Engineering and Technology
  • 2008
Jahangir and H.Rasifard "Analysis of Public Key Cryptography
  • World Academy of Science Engineering and Technology,
  • 2008
Smartening the Enviornment using Wireless Sensor Networks in Developing Country", CACT,2006
  • 2006
Associate Director of Research and Head, Advanced Control and Sensor MEMS Group "Wireless Sensor Networks
  • Smart Environments: Technologies, Protocols, and Applications
  • 2004