Sinkhole Detection in IOT using Elliptic Curve Digital Signature

نویسندگان

چکیده

A variety of smart applications, including homes, transportation, health, and robots in industries, are starting to gain interest due the fast expansion Internet Things (IoT). Smart devices made up sensors actuators that actively involved monitoring, prediction, security, information sharing IoT ecosystem. These state-of-the-art (SOTA) technologies enable people monitor manage their unified milieu real-time. nevertheless regularly used hostile situations, where attackers try grab penetrate them take over entire network. Due possibility selective forwarding, sinkhole, blackhole, wormhole attacks on networks is a serious security risk. This research offers an effective method using digital signature detect mitigate sinkhole resolve this problem. By doing thorough study suggested system, it shows how safe resistant secure attack detection. In study, elliptic curve algorithm along with node ranker environment. According performance analysis experimental findings compared other research, system good detection accuracy greatly lowers overhead associated computing, communication, storage.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Implementation of Elliptic Curve Digital Signature Algorithm

The Elliptic Curve Digital Signature Algorithm (ECDSA) is the elliptic curve analogue of the Digital Signature Algorithm (DSA). It was accepted in 1999 as an ANSI standard, and was accepted in 2000 as IEEE and NIST standards. It was also accepted in 1998 as an ISO standard, and is under consideration for inclusion in some other ISO standards. Unlike the ordinary discrete logarithm problem and t...

متن کامل

Make a Secure Connection Using Elliptic Curve Digital Signature

It is generally accepted that data encryption is the key role in current and future technologies. Many Public key cryptography schemes were presented, divided into different classes depending on a specific mathematical problem. Cryptography plays an important task in accomplishing information security. It is used for encrypting or signing data at the source before transmission, and then decrypt...

متن کامل

The new protocol blind digital signature based on the discrete logarithm problem on elliptic curve

In recent years it has been trying that with regard to the question of computational complexity of discrete logarithm more strength and less in the elliptic curve than other hard issues, applications such as elliptic curve cryptography, a blind  digital signature method, other methods such as encryption replacement DLP. In this paper, a new blind digital signature scheme based on elliptic curve...

متن کامل

Deterministic Usage of the Digital Signature Algorithm (DSA) and Elliptic Curve Digital Signature Algorithm (ECDSA)

This document defines a deterministic digital signature generation procedure. Such signatures are compatible with standard Digital Signature Algorithm (DSA) and Elliptic Curve Digital Signature Algorithm (ECDSA) digital signatures and can be processed with unmodified verifiers, which need not be aware of the procedure described therein. Deterministic signatures retain the cryptographic security...

متن کامل

Implementation and Performance Analysis of Elliptic Curve Digital Signature Algorithm

In this paper we present a novel method for obtaining fast software implementation of the Elliptic Curve Digital Signature Algorithm in the finite field GF(p) with an arbitrary prime modulus p of arbitrary length. The most important feature of the method is that it avoids bit-level operations which are slow on microprocessors and performs word-level operations which are significantly faster. Th...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal on Recent and Innovation Trends in Computing and Communication

سال: 2023

ISSN: ['2321-8169']

DOI: https://doi.org/10.17762/ijritcc.v11i5.6620