Hero Modares, Amirhossein Moravejosharieh, R. Salleh
{"title":"利用椭圆曲线加密技术实现无线网络安全","authors":"Hero Modares, Amirhossein Moravejosharieh, R. Salleh","doi":"10.1109/ICI.2011.63","DOIUrl":null,"url":null,"abstract":"As wireless sensor networks continue to grow, so does the need for effective security mechanisms. Sensor networks may interact with sensitive data and/or operate in hostile unattended environments, it needs to be secured. It is an important challenge to find out suitable cryptography for wireless sensor networks due to limitations of energy, computation capability and storage resources. We present a comparison of two public-key algorithms, RSA and Elliptic Curve Cryptography (ECC). We found ECC to have a significant advantage over RSA as it reduces computation time and also the amount of data transmitted and stored.","PeriodicalId":146712,"journal":{"name":"2011 First International Conference on Informatics and Computational Intelligence","volume":"37 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":"{\"title\":\"Wireless Network Security Using Elliptic Curve Cryptography\",\"authors\":\"Hero Modares, Amirhossein Moravejosharieh, R. Salleh\",\"doi\":\"10.1109/ICI.2011.63\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"As wireless sensor networks continue to grow, so does the need for effective security mechanisms. Sensor networks may interact with sensitive data and/or operate in hostile unattended environments, it needs to be secured. It is an important challenge to find out suitable cryptography for wireless sensor networks due to limitations of energy, computation capability and storage resources. We present a comparison of two public-key algorithms, RSA and Elliptic Curve Cryptography (ECC). We found ECC to have a significant advantage over RSA as it reduces computation time and also the amount of data transmitted and stored.\",\"PeriodicalId\":146712,\"journal\":{\"name\":\"2011 First International Conference on Informatics and Computational Intelligence\",\"volume\":\"37 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2011-12-12\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"6\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2011 First International Conference on Informatics and Computational Intelligence\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICI.2011.63\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2011 First International Conference on Informatics and Computational Intelligence","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICI.2011.63","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Wireless Network Security Using Elliptic Curve Cryptography
As wireless sensor networks continue to grow, so does the need for effective security mechanisms. Sensor networks may interact with sensitive data and/or operate in hostile unattended environments, it needs to be secured. It is an important challenge to find out suitable cryptography for wireless sensor networks due to limitations of energy, computation capability and storage resources. We present a comparison of two public-key algorithms, RSA and Elliptic Curve Cryptography (ECC). We found ECC to have a significant advantage over RSA as it reduces computation time and also the amount of data transmitted and stored.