Please use this identifier to cite or link to this item: http://localhost:8080/xmlui/handle/123456789/2102
Title: Implementation of ECDSA in WSN
Authors: Kodali, R.K.
Keywords: ECC ,
SHA-1
ECDSA
WSN
Issue Date: 2013
Publisher: 2013 International Conference on Control Communication and Computing, ICCC 2013
Citation: 10.1109/ICCC.2013.6731670
Abstract: Wireless sensor networks (WSN's) have been finding their application in diversified fields. Certain WSN applications used in military and commercial fields require the data communication within the network to be secure and confidentiality of the data needs to be maintained. Any WSN security model requires key services, authentication and integrity. As WSN nodes are resource constrained, in terms of limited battery energy and less CPU capabilities, energy efficient crypto-algorithms need to be chosen. Elliptic curve (EC) based algorithms have proven to be computationally efficient and provide the same security level when compared with traditional crypto-algorithms for the given key size. This work provides implementation details of ECDSA, making use of the low-cost SHA-1. The WSN implementation of SHA-1 involves 8-bit operations as the IRIS node supports an 8- bit micro-controller. The SHA-1 and ECDSA algorithms have been implemented using IRIS WSN node.
Description: NITW
URI: http://localhost:8080/xmlui/handle/123456789/2102
Appears in Collections:Electronics and Communication Engineering

Files in This Item:
File Description SizeFormat 
Implementation_of_ECDSA_in_WSN.pdf689.92 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.