{"title":"Energy Efficient ECC Authenticated Key Exchange Protocol for Star Topology Wireless Sensor Networks","authors":"A. Chmielowiec, Leszek Klich, Weronika Woś","doi":"10.26636/jtit.2024.1.1389","DOIUrl":null,"url":null,"abstract":"The article proposes a new energy-efficient protocol designed for star topology wireless sensor networks. The protocol has been implemented using ECC, although it can be easily adapted to any algebraic structure, where the discrete logarithm problem is computationally challenging. In addition to the formal description, the authors provide the results of an investigation concerned with the protocol's security properties, conducted by verifying the model using Scyther software. The publication also includes an analysis of the protocol's energy consumption, performed with the use of hardware platforms with ARM microcontrollers.","PeriodicalId":38425,"journal":{"name":"Journal of Telecommunications and Information Technology","volume":"112 24","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2024-01-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Telecommunications and Information Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.26636/jtit.2024.1.1389","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"Engineering","Score":null,"Total":0}
引用次数: 0
Abstract
The article proposes a new energy-efficient protocol designed for star topology wireless sensor networks. The protocol has been implemented using ECC, although it can be easily adapted to any algebraic structure, where the discrete logarithm problem is computationally challenging. In addition to the formal description, the authors provide the results of an investigation concerned with the protocol's security properties, conducted by verifying the model using Scyther software. The publication also includes an analysis of the protocol's energy consumption, performed with the use of hardware platforms with ARM microcontrollers.