2016
DOI: 10.14257/ijfgcn.2016.9.2.08
|View full text |Cite
|
Sign up to set email alerts
|

An Improved ECDSA Scheme for Wireless Sensor Network

Abstract: With the widely application of the Wireless Sensor Network, it is particularly significant to assure a secure communication mechanism between the nodes. In order to meet the needs of sensor nodes on low power consumption and less resource, lightweight cryptographic algorithm designed well is the key to constructing a riskless WSN scheme. In this paper, we propose an improved elliptic curve cryptography digital signature scheme by means of optimizing the multiplicative inverse module of ECDSA, based on ECC ligh… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
12
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 13 publications
(15 citation statements)
references
References 11 publications
0
12
0
Order By: Relevance
“…This prime factor of the sensor stations on low force utilization and less asset is handled by a lightweight cryptographic calculation which is structured well so that it's a perfect to build a riskless WSN plot. The work presented by the Hong Jhong et al (2016) [23] in their proposal describes an improved elliptic bend cryptography digital signature scheme by methods for upgrading the multiplicative inverse module of ECDSA, in light of ECC lightweight cryptographic calculation which is structured well so that it's a perfect to build a riskless WSN plot. 3.…”
Section: Rsa Rabin Williamsmentioning
confidence: 99%
See 2 more Smart Citations
“…This prime factor of the sensor stations on low force utilization and less asset is handled by a lightweight cryptographic calculation which is structured well so that it's a perfect to build a riskless WSN plot. The work presented by the Hong Jhong et al (2016) [23] in their proposal describes an improved elliptic bend cryptography digital signature scheme by methods for upgrading the multiplicative inverse module of ECDSA, in light of ECC lightweight cryptographic calculation which is structured well so that it's a perfect to build a riskless WSN plot. 3.…”
Section: Rsa Rabin Williamsmentioning
confidence: 99%
“…Proposed method By just changing the hash value, the Middle Man or interloper can without a ton of stretch alter or supervene upon the message that can't be seen by the recipient. Remembering the necessities of ECDSA that are littler key size and high security researchers are following up on the issues .The up to referenced Jhong's plan [23] attempts to achieve power by decreasing the save standard inverse operations, but it neglects to accomplish security; in light of the fact that the intruder will essentially adjust the message and supplant the current message hash an incentive with changed hash value and in this way it neglects to achieve security traits of digital signature scheme. Dhanashree K Toradmalle et al [24] gives a point by point cryptanalysis of the Jhong's arrangement and shows how Jhong's method is vulnerable to man in the middle attack We thusly propose an arrangement which ensures that the Forward Secrecy and Intruder ambushes can be dealt with and guarantee an amazing ECDSA.…”
Section: Rsa Rabin Williamsmentioning
confidence: 99%
See 1 more Smart Citation
“…The Middle Man or intruder can without a lot of stretch modify or supervene upon the message that can't be perceived by the receiver, by merely adjusting the hash value Researchers are acting on the on top of problems keeping in mind the necessities of ECDSA that are smaller key size and high security. The afore mentioned Jhong's scheme [21] tries to attain potency by reducing the reserve standard inverse operations however it fails to attain security; because the intruder will simply alter the message and replace the present message hash value with changed hash value and thereby it fails to attain security attributes of a digital signature scheme. Dhanashree K Toradmalle et al [22] gives a point by point cryptanalysis of the Jhong's plan and shows how Jhong's technique is inclined to man in the center assault We along these lines propose a plan which guarantees that the Forward Secrecy and Intruder assaults can be taken care of and ensure a powerful ECDSA.…”
Section: Proposed Algorithmmentioning
confidence: 99%
“…A study by Reference 33 proposed an improved elliptic curve digital signature scheme for use on WSNs by optimizing the signature generation module of ECDSA. However, they were unable to reduce the number of point additions and point multiplication in the verification algorithm.…”
Section: Introductionmentioning
confidence: 99%