Open Access Open Access  Restricted Access Subscription or Fee Access

Comparison of RSA and ECC Public key Cryptography Techniques in WSN

S. Aruna Deepthi, E. Sreenivasa Rao, Pavan Kumar


Nowadays, the usage of the wireless sensor networks becomes more advanced and popular. The more these technologies are increasing; there is more necessity for the security mechanisms where the networks have increased diverse. So many security mechanisms solutions are been proposed in the domain of WSN so far and mostly these solutions are usually based on the cryptographic techniques or algorithms. This paper describes two public key cryptography techniques namely, RSA and elliptic curve cryptography (ECC), and consider the mutual authentication and key exchange between two untrusted parties such as two nodes in a wireless sensor network. In other words, the digital signature standard and its verification of the message is generated in both the public key algorithms. Additionally, the Diffie hellman and Elgamal algorithms are also be calculated to provide the keys of the user securely. It is seen that ECC has more advantages and powerful compared with RSA in terms of key exchange, mutual authentication.


RSA Encryption, Algorithmm, cryptography

Full Text:



William Stallings, eight edition on Cryptography and Network Security: Principle and Practices

Autonomous Energy-Efficient Wireless Sensor Network Platform for Home/Office Automation

Behrouz A. Forouzan, fourth edition on Cryptography and Network Security

Simplified RSA and ECC with mutual authentication based on SSL handshake. mutual- authentication-Pay-load-message_fig1_4123915

A study of the ECC, RSA and Diffie-hellman Algorithms in network security.

Benjami Arazi, Itamar Arel, Ortal Arzi; Revisiting public-key cryptography forwireless sensor networks, IEEE paper, Volume: 38, Issue: 11, Nov. 2005

Aiman Faquih, Priyanka Kadam, Zia Saquib; Cryptographic Techniques for Wireless Sensor Networks: A survey ;A 2015 IEEE paper

Dindayal Mahto, Dilip Kumar Yadav; The RSA and ECC: A Comparative Analysis; International Journal of Applied Engineering Research ISSN 0973-4562 Volume 12, Number 19 (2017) pp. 9053-9061; Research India Publications. 9053 RSA and ECC: A Comparative Analysis

Suli Wang, Ganlai Liu ; implemented File encryption and decryption system based onRSA algorithm; 2011 international journal

Elliptical Curve Elgamal Encryption and Signature Schemes by Kefa Rebal. yption_and_Signature_Schemes

Xing Zhang, Shaohua Ma, Dong Han, and Wei Sh (2015) Implementation of Elliptic Curve Diffie-Hellman Key Agreement Scheme on IRIS Nodes.

“ “ which gives the information on digital signature and digital certificates

Christian lederarar, Roland Meder, Manuel Koschu, Alexandar Szekely, Stefan Tilliach; (2009) Energy-Efficient Implementation of ECDH Key Exchange for Wireless Sensor Networks. 03944-7_9

“Performance Comparison of Elliptic Curve and RSA Digital Signatures” proposed by Nicholas Jansma and Brandon Arrendondo on international Conference

Lavanya K.Galla, Venkata Sreekrishna Koganti, Nagarjuna Nuthalapati, “Implementation of RSA”, 2016 International Conference on Control, Instrumentation, Communication and Computational Technologies(ICCICCT)

A key distribution scheme using elliptic curve cryptography in wireless sensor networks, July 2016 DOI:10.1109/INDIN.2016.7819342, Conference: 2016 IEEE 14th International Conference on Industrial Informatics (INDIN)

Mahto, D. and Yadav, D.K., 2017. One-Time Password Communication Security Improvement using Elliptic Curve Cryptography with Iris Biometric. International Journal of Applied Engineering Research, 12(18), pp.7105-7114.

Mahto, D. and Yadav, D.K., 2017, Secure Online Medical Consultations Using Elliptic Curve Cryptography with Iris Biometric. International Journal of Control Theory and Applications, 10(13), pp.169-179


  • There are currently no refbacks.

Copyright (c) 2022 Journal of VLSI Design Tools & Technology

eISSN: 2249–474X