Elliptic Curve Cryptography for Enhancing Security and Reducing Network Overhead in Wireless Sensor Networks(English, Paperback, Dr. S Baskar Dr. Poonam Yadav Dr. K.p. Sridhar Dr. V.r. Sarma Dhulipala Abubeker K M) | Zipri.in
Elliptic Curve Cryptography for Enhancing Security and Reducing Network Overhead in Wireless Sensor Networks(English, Paperback, Dr. S Baskar Dr. Poonam Yadav Dr. K.p. Sridhar Dr. V.r. Sarma Dhulipala Abubeker K M)

Elliptic Curve Cryptography for Enhancing Security and Reducing Network Overhead in Wireless Sensor Networks(English, Paperback, Dr. S Baskar Dr. Poonam Yadav Dr. K.p. Sridhar Dr. V.r. Sarma Dhulipala Abubeker K M)

Quick Overview

Rs.870 on FlipkartBuy
Product Price Comparison
WSN consists of collection of sensor nodes which are used to monitor the physical conditions of the environment parameters such as pressure, temperature, etc., and transmit the information to the desired destination. During the information transmission process network faces challenges such as security, routing, energy conservation issues, scalability, reliability, confidentiality, integrity, authentication, etc., In order to overcome these challenges different routing protocols such as data-centric, location and mobility, Quality of Service (QoS)-based protocols and multipath routing protocols have been used. Even though these routing protocols ensure the effective transaction, the network needs to handle the intermediate attacks which in turn change the entire content of transmitted messages. So, several cryptographic techniques have been applied to the network for minimization. The introduced symmetric and asymmetric algorithms are vulnerable to area overhead, on- chip power consumption, peak memory usage and path delay issues. Hence the effective smaller key size and high security based ECC with optimized multiplier architecture has been utilized to minimize these malicious activities in WSNs and to overcome these vulnerable issues. Thus the major objective of the work is to improve the network security as well as minimize the area overhead, on chip power and path delay related issues by utilizing the constrained network resources.