z-logo
open-access-imgOpen Access
Design and Implementation of Secure Communication using Elliptic Curve Cryptograph between Wireless Sensor Nodes
Author(s) -
Gagana B E*,
S Usha,
K. Rajesh
Publication year - 2019
Publication title -
international journal of innovative technology and exploring engineering
Language(s) - English
Resource type - Journals
ISSN - 2278-3075
DOI - 10.35940/ijitee.i7508.119119
Subject(s) - elliptic curve cryptography , encryption , key (lock) , cryptography , computer science , key size , key exchange , cipher , symmetric key algorithm , elliptic curve , public key cryptography , computer security , computer network , mathematics , mathematical analysis
Wireless Sensor Networks is an emerging trend and has become gradually popular across wide range. A key distributional protocol is intended to safely provide authentic motes with secret keys system using Elliptic Curve Cryptography functions. The convention is a variation of the Diffie_Hellman convention utilizing Elliptic Curve Cryptography. It’s agreement of a key convention that permits pair of gatherings, both having a elliptic open and closed key, to build up a mutual secret key over an uncertain channel. This shared secret key may be either utilized as key or used to determine another key which would then be able to be utilized to subsequent correspondences utilizing a cipher of symmetric key. The use of advanced encryption standard for the encrypt and decrypt of the data also ensures that security is never flawed. Therefore Elliptic curve cryptograph is a best candidate for providing secure communication between Wireless Sensor Networks.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here