Corpus ID: 14258075

Enhancing Energy Efficiency in Wireless Sensor Networks via Improving Elliptic Curve Digital Signature Algorithm

@inproceedings{Kheradm2013EnhancingEE,
  title={Enhancing Energy Efficiency in Wireless Sensor Networks via Improving Elliptic Curve Digital Signature Algorithm},
  author={Behbod Kheradm and L. M. Khanli},
  year={2013}
}
The Elliptic Curve Digital Signature Algorithm (ECDSA) is the elliptic curve analogue of the Digital Signature Algorithm (DSA). It is used in wireless sensor networks in order to establish security and allow legitimate users to join in the network and disseminate messages into the networks. The ECDSA needs an addition point and two multi scalar for verifying users' signature in WSNs, that because decrease signature verification speed, in result it has also incurred a series of problems such as… Expand
3 Citations

Figures from this paper

PROPOSING A KEY MANAGEMENT AUTHENTICATION PROTOCOL IN WIRELESS SENSOR NETWORK (WSNS)
TLDR
The proposed protocol is a two-sided key bilateral management protocol for authenticating originality which has asymmetric encryption and uses nonce and timestamps to ensure that keys and messages are new and prevents the repetition attack. Expand
Hybrid Artificially Intelligent Multi-Layer Blockchain and Bitcoin Cryptology (AI-MLBBC)
TLDR
An integrated secured framework of blockchain and bitcoin cryptology with the artificial intelligent neural networks (AINN) algorithms will lead to minimal risk as a part of the blockchain to protect personal data and information as third wall defense against hacking. Expand

References

SHOWING 1-10 OF 13 REFERENCES
On Broadcast Authentication in Wireless Sensor Networks
TLDR
This paper presents several effective public key based schemes to achieve immediate broadcast authentication and thus overcome the vulnerability presented in the muTESLA-like schemes. Expand
Securing Wireless Sensor Networks: Security Architectures
TLDR
This paper considers a number of the security architectures employed, and proposed, to date, with this goal in sight such that the various characteristics of each protocol are easily identifiable to potential network designers, allowing a more informed decision to be made when implementing a security protocol for their intended application. Expand
Surface Coverage Improvement in Wireless Sensor Network
Recently, wireless sensor networks have found their way into a wide variety of applications and systems with vastly varying requirements and characteristics, including environmental monitoring,Expand
Guide to Elliptic Curve Cryptography
TLDR
This guide explains the basic mathematics, describes state-of-the-art implementation methods, and presents standardized protocols for public-key encryption, digital signatures, and key establishment, as well as side-channel attacks and countermeasures. Expand
Guide to Elliptic Curve Cryptography", New York, USA: Springer-Verlag, "Implementation of Elliptic Curve Digital Signature Aplication
  • Computer Science and Engineering (IJCSE)
  • 2004
" Security for complicated topologies and deployments
  • 2011
Energy based Path Planning ECDSA Signatures", Berlin, Germany, for WSNs
  • International Journal on Emerging
  • 2010
" A Survey on Wireless Sensor RFID Tags : Hummingbird Algorithm and Protocol " , Network Security "
  • International Journal of Centre for Applied Cryptographic Research ( CACR ) Communication Networks and Information Technical Reports
  • 2009
A Survey on Wireless Sensor RFID Tags: Hummingbird Algorithm and Protocol
  • CACR) Communication Networks and Information Technical Reports
  • 2009
Energy based Path Planning ECDSA Signatures
  • Ultra-Lightweight cryptography for Low-Cost
  • 2009
...
1
2
...