International Conference on Computer Networks and Information Technology 2011
DOI: 10.1109/iccnit.2011.6020911
|View full text |Cite
|
Sign up to set email alerts
|

Security for WSN based on elliptic curve cryptography

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 18 publications
(9 citation statements)
references
References 14 publications
0
9
0
Order By: Relevance
“…The black, white, and crossed circles represent the active sensors, inactive sensors, and the sink respectively. As shown in the figure, if 0 ≤ t ≤ 40, each algorithm has a specific error interval (in %) as follows: [14,20] for SVM, [7,10] for NB, [7,12] for RF, [2,6] for GTB, [4,8] for TBFS, and [12,17] for NN. After that (if t > 40) the error rate for each algorithm increased significantly at these intervals to reach, at t = 50, 40 % for SVM, 20 % for NB, 16 % for RF, 30 % for GTB, 18 % for TBFS, and 36 % for NN.…”
Section: Impact Of Topologies On Diagnosticsmentioning
confidence: 99%
See 1 more Smart Citation
“…The black, white, and crossed circles represent the active sensors, inactive sensors, and the sink respectively. As shown in the figure, if 0 ≤ t ≤ 40, each algorithm has a specific error interval (in %) as follows: [14,20] for SVM, [7,10] for NB, [7,12] for RF, [2,6] for GTB, [4,8] for TBFS, and [12,17] for NN. After that (if t > 40) the error rate for each algorithm increased significantly at these intervals to reach, at t = 50, 40 % for SVM, 20 % for NB, 16 % for RF, 30 % for GTB, 18 % for TBFS, and 36 % for NN.…”
Section: Impact Of Topologies On Diagnosticsmentioning
confidence: 99%
“…WSN strategies that can be considered are: the topologies [41,73,40], coverage [25,30], deployment strategy [52,17], scheduling mechanism [71,30,63,64,31], density [3], security [51,4], data aggregation [37,75,44], packet transfer distance, battery, memory, etc. These strategies have a strong impact on the effectiveness of the network with time, consequently on the quality of the data that will be captured in the monitored area, and finally on PHM.…”
Section: Introductionmentioning
confidence: 99%
“…Such implementation has been given in [12] and [13]. Applications requiring simple security may use stream ciphers which has been demonstrated in [14].…”
Section: Literature Reviewmentioning
confidence: 99%
“…Elliptic Curve based asymmetric cryptosystem was implemented [4] by Muhammad Hammad Ahmed et al, in which ECC is used for its smaller key size. This greatly reduces the computational cost.…”
mentioning
confidence: 99%