Fast and secure implementation of ecc-based concealed data aggregation in wsn …
Kumar, V. (2019, June). A Bilinear Pairing Based Secure Data Aggregation Scheme for WSNs. In 2019 15th International Wireless Communications & Mobile Computing Conference (IWCMC) (pp. 102-107). IEEE.
Elliptic Curve Cryptography (ECC) shows that it is now feasible to implement ECC for WSNs …
Rahman, M., & El-Khatib, K. (2010). Secure time synchronization for wireless sensor networks based on bilinear pairing functions. IEEE Transactions on Parallel and Distributed Systems.
This paper improves an authentication protocol based on The Elliptic curve Cryptography, and applies it to WSNs.
Chang, Q., Zhang, Y. P., & Qin, L. L. (2010, June). A node authentication protocol based on ECC in WSN. In 2010 International Conference On Computer Design and Applications (Vol. 2, pp. V2-606). IEEE.
In 2014, Nam et al. [22] proposed a provable secure authentication protocol for WSN using ECC
Li, X., Niu, J., Bhuiyan, M. Z. A., Wu, F., Karuppiah, M., & Kumari, S. (2017). A robust ECC-based provable secure authentication protocol with privacy preserving for industrial internet of things. IEEE Transactions on Industrial Informatics, 14(8), 3599-3609.
Ahmed, M. H., Alam, S. W., Qureshi, N., & Baig, I. (2011, July). Security for WSN based on elliptic curve cryptography. In International Conference on Computer Networks and Information Technology (pp. 75-79). IEEE.
Rafik, M. B. O., & Mohammed, F. (2013, October). Fast and secure implementation of ECC-based concealed data aggregation in WSN. In Global Information Infrastructure Symposium-GIIS 2013 (pp. 1-7). IEEE.
ECC‐based authentication and key agreement scheme for WSNs...
Kumari, S., & Renuka, K. (2020). A provably secure biometrics and ECC‐based authentication and key agreement scheme for WSNs. International Journal of Communication Systems, 33(3), e4194.
Zkik, K., Orhanou, G., & El Hajji, S. (2017, August). A new secure framework in WSNs using ECC: Medical application. In 2017 International Conference on Engineering and Technology (ICET) (pp. 1-7). IEEE.
This paper provides the study and application of ECC in WSN on a popular WSN operating system, TinyOS …
Saqib, N., & Iqbal, U. (2016, October). Security in wireless sensor networks using ECC. In 2016 IEEE International Conference on Advances in Computer Applications (ICACA) (pp. 270-274). IEEE.
Recent research results have shown that Elliptic Curve Cryptography (ECC) is feasible on resource constrained sensor nodes. In this work we demonstrate that the related but more complex primitives of Pairing Based Cryptography(PBC) are also well suited for sensor devices. We present the first in-depth study on the application and implementation of PBC to Wireless Sensor Networks (WSNs). Our implementations are all the fastest yet reported, and have been implemented across a range of WSN processors. On a system level we investigate the application of a simple non-interactive key exchange scheme that is particularly suitable for many WSN scenarios. We also present a novel variant of the key exchange protocol which can be useful in even more demanding applications, and which partially solves the problem of node compromise attacks.
Fast and secure implementation of ecc-based concealed data aggregation in wsn …
Kumar, V. (2019, June). A Bilinear Pairing Based Secure Data Aggregation Scheme for WSNs. In 2019 15th International Wireless Communications & Mobile Computing Conference (IWCMC) (pp. 102-107). IEEE.