2013 11th International Symposium on Programming and Systems (ISPS) 2013
DOI: 10.1109/isps.2013.6581488
|View full text |Cite
|
Sign up to set email alerts
|

The impact of ECC's scalar multiplication on wireless sensor networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
32
0

Year Published

2013
2013
2020
2020

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 13 publications
(32 citation statements)
references
References 12 publications
0
32
0
Order By: Relevance
“…To give confidentiality in the communication network, ECC has been utilized to encrypt data and it relies upon the discrete logarithmic problem (DLP) because it's very difficult to attack and to get an integer k from the points on the curve P and Q [5]. ECC provides encryption, signal generation and key exchange [6].…”
Section: Eccmentioning
confidence: 99%
“…To give confidentiality in the communication network, ECC has been utilized to encrypt data and it relies upon the discrete logarithmic problem (DLP) because it's very difficult to attack and to get an integer k from the points on the curve P and Q [5]. ECC provides encryption, signal generation and key exchange [6].…”
Section: Eccmentioning
confidence: 99%
“…The algorithm depends on the elliptic curve discrete logarithm problem (ECDLP). It is impervious against different attacks when the parameters are accurately selected [31], i.e., it is difficult to obtain k from P and Q (where k is an integer and P and Q are two points on the curve) [32,33]. ECDSA uses small parameters which expedites the performance of computations, thus reducing time and storage [34].…”
Section: Overview Of Security and Privacy Techniques In Ehr Systemsmentioning
confidence: 99%
“…These features are very important for large organizations and constrained-source devices such as wireless sensor networks (WSN) that require processing power, memory, bandwidth, or power consumption [35]. More details about ECDSA’s signature and verification are available in [31]. Shamir schemeThe secret sharing scheme or the Shamir (SSs, t ) scheme depends on a set of keys/secrets sharing (SSs) and threshold ( t ) to produce a master key/secret (MS).…”
Section: Overview Of Security and Privacy Techniques In Ehr Systemsmentioning
confidence: 99%
See 1 more Smart Citation
“…Thus, the network is provided with a chance to identify all that is shared by all the nodes of this network (Peres, Chalouf, & Krief, 2011). Jayanthiladevi made improvements on the suggestion by Martin Peres and added that safe communication can be made possible by user authentication in addition to using "public key cryptography" when the number of users exceed scalability (Rafik & Mohammed, 2013).…”
Section: Introductionmentioning
confidence: 99%