DefinePK

DefinePK hosts the largest index of Pakistani journals, research articles, news headlines, and videos. It also offers chapter-level book search.

Analysis of Elliptic Curve Cryptography (ECC) for Energy Efficiency in Wireless Sensor Networks


Article Information

Title: Analysis of Elliptic Curve Cryptography (ECC) for Energy Efficiency in Wireless Sensor Networks

Authors: Zain Ul Abideen Tariq, Shahzad Shahid Peracha, Khurram Aziz

Journal: NUST Journal of Engineering Sciences

HEC Recognition History
Category From To
Y 2024-10-01 2025-12-31
Y 2023-07-01 2024-09-30
Y 2022-07-01 2023-06-30
Y 2021-07-01 2022-06-30
Y 2016-02-29 2019-12-19
Y 2015-03-12 2016-02-28

Publisher: National University of Sciences & Technology, Rawalpindi/Islamabad (NUST)

Country: Pakistan

Year: 2009

Volume: 2

Issue: 1

Language: en

DOI: 10.24949/njes.v2i1.55

Categories

Abstract

Rapid growth of wireless sensor networks (WSN) in recent times has resulted in greater security requirements. One of the primary concerns in wireless sensor networks is energy efficiency and security mechanisms are no different.  Currently, security in wireless sensor networks is often implemented by symmetric key cryptography due to its low-power implementation. Public Key Cryptography (PKC), on the other hand, is advantageous as it requires less overhead information during transmission of packets that ultimately lessens overall size of the protocol. In addition, Public Key Cryptography provides better data confidentiality and authentication in wireless sensor networks. In this study, we focus on Public Key Cryptography for greater efficiency in key distribution, low protocol overhead and efficient hardware implementation on the sensor nodes. Considering the constraints of energy efficient wireless sensor networks, we analyze and compare some well known Public Key algorithms, their implementation in wireless sensor networks, and how these algorithms can benefit the fundamental security services. We also evaluate energy consumption parameters for encryption as well as data transmission and suggest energy efficient encryption mechanisms.


Paper summary is not available for this article yet.

Loading PDF...

Loading Statistics...