The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2017
DOI: 10.17485/ijst/2017/v10i13/108661
|View full text |Cite
|
Sign up to set email alerts
|

A New Key Management Scheme for Wireless Sensor Networks using an Elliptic Curve

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
19
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 13 publications
(19 citation statements)
references
References 6 publications
0
19
0
Order By: Relevance
“…The parameter calculates the amount of time an algorithm takes on a specific amount of data. The results of the proposed approach are compared with the research results in the study by Singh et al 14 Table 2 in the study by Singh et al 14 shows the performance of their proposed scheme. Where the key generation, encryption, and decryption are performed on 10-byte length of data where the key varies in terms of different ECC values generated.…”
Section: Computational Timementioning
confidence: 98%
See 3 more Smart Citations
“…The parameter calculates the amount of time an algorithm takes on a specific amount of data. The results of the proposed approach are compared with the research results in the study by Singh et al 14 Table 2 in the study by Singh et al 14 shows the performance of their proposed scheme. Where the key generation, encryption, and decryption are performed on 10-byte length of data where the key varies in terms of different ECC values generated.…”
Section: Computational Timementioning
confidence: 98%
“…12 In terms of security, this algorithm only uses exclusive or (XOR) operation for the encryption, making it uncertain against the known-plaintext and chosen-plaintext attacks. 13 Additional research proposed elliptic curve cryptography-key management (E-KM) 14 where a key organizing procedure is presented. This research methodology is insecure against a collision search attack.…”
Section: Literature Reviewmentioning
confidence: 99%
See 2 more Smart Citations
“…A Chain Based Cluster Co-operative Protocol (CBCCP) is projected in (9) and Markov model is taken into account in (10) . Monjul Saikia (11) recommend a new network structure model, compared to the original energy consumption model (12) , the formula for finding the optimal cluster number in the area is proposed in a given WSN.…”
Section: Introductionmentioning
confidence: 99%