

Comparison of RSA and ECC Public key Cryptography Techniques in WSN
Abstract
Nowadays, the usage of the wireless sensor networks becomes more advanced and popular. The more these technologies are increasing; there is more necessity for the security mechanisms where the networks have increased diverse. So many security mechanisms solutions are been proposed in the domain of WSN so far and mostly these solutions are usually based on the cryptographic techniques or algorithms. This paper describes two public key cryptography techniques namely, RSA and elliptic curve cryptography (ECC), and consider the mutual authentication and key exchange between two untrusted parties such as two nodes in a wireless sensor network. In other words, the digital signature standard and its verification of the message is generated in both the public key algorithms. Additionally, the Diffie hellman and Elgamal algorithms are also be calculated to provide the keys of the user securely. It is seen that ECC has more advantages and powerful compared with RSA in terms of key exchange, mutual authentication.
Keywords
References
William Stallings, eight edition on Cryptography and Network Security: Principle and Practices
Autonomous Energy-Efficient Wireless Sensor Network Platform for Home/Office Automation https://ieeexplore.ieee.org/document/8611101
Behrouz A. Forouzan, fourth edition on Cryptography and Network Security
Simplified RSA and ECC with mutual authentication based on SSL handshake. researchgate.net/figure/Simplified-RSA-and-ECC-based-SSL-handshake-with- mutual- authentication-Pay-load-message_fig1_4123915
A study of the ECC, RSA and Diffie-hellman Algorithms in network security. https://ieeexplore.ieee.org/document/8551161
Benjami Arazi, Itamar Arel, Ortal Arzi; Revisiting public-key cryptography forwireless sensor networks, IEEE paper, Volume: 38, Issue: 11, Nov. 2005
Aiman Faquih, Priyanka Kadam, Zia Saquib; Cryptographic Techniques for Wireless Sensor Networks: A survey ;A 2015 IEEE paper
Dindayal Mahto, Dilip Kumar Yadav; The RSA and ECC: A Comparative Analysis; International Journal of Applied Engineering Research ISSN 0973-4562 Volume 12, Number 19 (2017) pp. 9053-9061; Research India Publications. http://www.ripublication.com 9053 RSA and ECC: A Comparative Analysis
Suli Wang, Ganlai Liu ; implemented File encryption and decryption system based onRSA algorithm; 2011 international journal
Elliptical Curve Elgamal Encryption and Signature Schemes by Kefa Rebal. https://www.researchgate.net/publication/45949429_Elliptic_Curve_ElGamal_Encr yption_and_Signature_Schemes
Xing Zhang, Shaohua Ma, Dong Han, and Wei Sh (2015) Implementation of Elliptic Curve Diffie-Hellman Key Agreement Scheme on IRIS Nodes. https://ieeexplore.ieee.org/document/7111560
“https://www.geeksforgeeks.org/digital-signatures-certificates/ “ which gives the information on digital signature and digital certificates
Christian lederarar, Roland Meder, Manuel Koschu, Alexandar Szekely, Stefan Tilliach; (2009) Energy-Efficient Implementation of ECDH Key Exchange for Wireless Sensor Networks. https://link.springer.com/chapter/10.1007/978-3-642- 03944-7_9
“Performance Comparison of Elliptic Curve and RSA Digital Signatures” proposed by Nicholas Jansma and Brandon Arrendondo on international Conference
Lavanya K.Galla, Venkata Sreekrishna Koganti, Nagarjuna Nuthalapati, “Implementation of RSA”, 2016 International Conference on Control, Instrumentation, Communication and Computational Technologies(ICCICCT)
A key distribution scheme using elliptic curve cryptography in wireless sensor networks, July 2016 DOI:10.1109/INDIN.2016.7819342, Conference: 2016 IEEE 14th International Conference on Industrial Informatics (INDIN)
Mahto, D. and Yadav, D.K., 2017. One-Time Password Communication Security Improvement using Elliptic Curve Cryptography with Iris Biometric. International Journal of Applied Engineering Research, 12(18), pp.7105-7114.
Mahto, D. and Yadav, D.K., 2017, Secure Online Medical Consultations Using Elliptic Curve Cryptography with Iris Biometric. International Journal of Control Theory and Applications, 10(13), pp.169-179
Refbacks
- There are currently no refbacks.
Copyright (c) 2022 Journal of VLSI Design Tools & Technology
eISSN: 2249–474X