Please use this identifier to cite or link to this item: http://localhost:8080/xmlui/handle/123456789/2102
Full metadata record
DC FieldValueLanguage
dc.contributor.authorKodali, R.K.-
dc.date.accessioned2024-12-24T10:53:48Z-
dc.date.available2024-12-24T10:53:48Z-
dc.date.issued2013-
dc.identifier.citation10.1109/ICCC.2013.6731670en_US
dc.identifier.urihttp://localhost:8080/xmlui/handle/123456789/2102-
dc.descriptionNITWen_US
dc.description.abstractWireless sensor networks (WSN's) have been finding their application in diversified fields. Certain WSN applications used in military and commercial fields require the data communication within the network to be secure and confidentiality of the data needs to be maintained. Any WSN security model requires key services, authentication and integrity. As WSN nodes are resource constrained, in terms of limited battery energy and less CPU capabilities, energy efficient crypto-algorithms need to be chosen. Elliptic curve (EC) based algorithms have proven to be computationally efficient and provide the same security level when compared with traditional crypto-algorithms for the given key size. This work provides implementation details of ECDSA, making use of the low-cost SHA-1. The WSN implementation of SHA-1 involves 8-bit operations as the IRIS node supports an 8- bit micro-controller. The SHA-1 and ECDSA algorithms have been implemented using IRIS WSN node.en_US
dc.language.isoenen_US
dc.publisher2013 International Conference on Control Communication and Computing, ICCC 2013en_US
dc.subjectECC ,en_US
dc.subjectSHA-1en_US
dc.subjectECDSAen_US
dc.subjectWSNen_US
dc.titleImplementation of ECDSA in WSNen_US
dc.typeOtheren_US
Appears in Collections:Electronics and Communication Engineering

Files in This Item:
File Description SizeFormat 
Implementation_of_ECDSA_in_WSN.pdf689.92 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.