2023
DOI: 10.1109/access.2022.3233632
|View full text |Cite
|
Sign up to set email alerts
|

An Efficient Authenticated Elliptic Curve Cryptography Scheme for Multicore Wireless Sensor Networks

Abstract: The need to ensure the longevity of Wireless Sensor Networks (WSNs) and secure their communication has spurred various researchers to come up with various WSN models. Prime among the methods for extending the life span of WSNs is the clustering of Wireless Sensors (WS), which reduces the workload of WS and thereby reduces its power consumption. However, a drastic reduction in the power consumption of the sensors when multicore sensors are used in combination with sensors clustering has not been well explored. … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

1
10
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 19 publications
(18 citation statements)
references
References 61 publications
(72 reference statements)
1
10
0
Order By: Relevance
“…Irrespective increased security provided by public-key based encryption techniques (such as ECC, RSA, etc. ); they are not favored for usage on resource-constrained WSN devices [2,3]. The private key-based encryption techniques (such as AES, DES, etc.)…”
Section: Introductionmentioning
confidence: 99%
“…Irrespective increased security provided by public-key based encryption techniques (such as ECC, RSA, etc. ); they are not favored for usage on resource-constrained WSN devices [2,3]. The private key-based encryption techniques (such as AES, DES, etc.)…”
Section: Introductionmentioning
confidence: 99%
“…Results indicate that the algorithm is more effective and safer in an IoT-driven setup, making it better suited for data security. Oladipupo et al (2023) proposed a WSN paradigm that uses multicore WS clustering. The current Elliptic Curve Cryptographic (ECC) technique is enhanced for security against simple assaults and parallel execution of the encryption and decryption procedures.…”
Section: Introductionmentioning
confidence: 99%
“…Many hardware accelerators of the ECPM are proposed [1,[3][4][5][6][7][8][9][10]. Some researchers focus on lightweight implementation [1,4,5,[8][9][10], developing ECPM processors to accelerate the ECPM operation.…”
mentioning
confidence: 99%
“…A flexible dual-field ECC processor using the hardware-software approach is presented by Liu [5]. Javeed [8,9] and Yue [10] explore the speed and area of ECPM on the FPGA platform. The ECPM processors aim at high-speed are proposed by Hossain [6], Xie [7], and Awaludin [3].…”
mentioning
confidence: 99%
See 1 more Smart Citation