Security Protocol Function Using Quantum Elliptic Curve Cryptography Algorithm

被引:6
作者
Sudharson, K. [1 ]
Arun, S. [2 ]
机构
[1] Anna Univ, Dept Informat & Commun Engn, Chennai 600025, Tamil Nadu, India
[2] Prathyusha Engn Coll, Dept ECE, Thiruvallur 602025, India
关键词
Quantum computing; elliptic curves; mobile ad hoc networks; cryptography; wireless sensor networks; KEY DISTRIBUTION; AUTHENTICATION PROTOCOL;
D O I
10.32604/iasc.2022.026483
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Quantum Computing (QC). The content of node or sink nodes is pro-cessed using the fundamental principles of quantum mechanics. However, crypto-graphy techniques face several other issues, such as availability, integrity, andvulnerability, to name a few. The researchers have overcome many obstacles,yet security remains a crucial concern in QC. However, experimenters recentlydiscovered that the QC has a lot more data hacking than static networks. More-over, the bitwise error is still present in implementing the Quantum ComputingCryptography Protocol (QCCP). Because all nodes are mobile and dynamic topol-ogy occurs, the proposed research uses the Quantum Elliptical Curve Cryptogra-phy (QECC) protocol. To provide the appropriate key generation and key sharingmechanism to convert the fool node to a brawny node and avoid packet loss andenergy consumption in the network. By turning the fool node into a vital node, theQECC lowers the network's error rate. The experiment uses Network Simulator2 to achieve successful outcomes such as decreased packet loss, reduced error ratewith increased energy consumption, increased pair key generation for additionalnodes, and increased packet size.
引用
收藏
页码:1769 / 1784
页数:16
相关论文
共 50 条
  • [21] Trading inversions for multiplications in elliptic curve cryptography
    Ciet, M
    Joye, M
    Lauter, K
    Montgomery, PL
    DESIGNS CODES AND CRYPTOGRAPHY, 2006, 39 (02) : 189 - 206
  • [22] Trading Inversions for Multiplications in Elliptic Curve Cryptography
    Mathieu Ciet
    Marc Joye
    Kristin Lauter
    Peter L. Montgomery
    Designs, Codes and Cryptography, 2006, 39 : 189 - 206
  • [23] Security Enhanced User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography
    Choi, Younsung
    Lee, Donghoon
    Kim, Jiye
    Jung, Jaewook
    Nam, Junghyun
    Won, Dongho
    SENSORS, 2014, 14 (06) : 10081 - 10106
  • [24] Development of security scheme on wireless sensor network based on Elliptic Curve Cryptography
    Li, Dongmei
    Liu, Yan
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON EDUCATION, MANAGEMENT, COMMERCE AND SOCIETY, 2015, 17 : 630 - 634
  • [25] An Efficient Mobile Voting System Security Scheme based on Elliptic Curve Cryptography
    Ahmad, Tohari
    Hu, Jiankun
    Han, Song
    NSS: 2009 3RD INTERNATIONAL CONFERENCE ON NETWORK AND SYSTEM SECURITY, 2009, : 474 - +
  • [26] Construction of elliptic curve cryptography-based authentication protocol for internet of things
    Chhikara, Deepak
    Rana, Saurabh
    Mishra, Ankita
    Mishra, Dheerendra
    SECURITY AND PRIVACY, 2022, 5 (04)
  • [27] A Key Distribution Scheme using Elliptic Curve Cryptography in Wireless Sensor Networks
    Louw, J.
    Niezen, G.
    Ramotsoela, T. D.
    Abu-Mahfouz, A. M.
    2016 IEEE 14TH INTERNATIONAL CONFERENCE ON INDUSTRIAL INFORMATICS (INDIN), 2016, : 1166 - 1170
  • [28] Selection of Security Elliptic Curve Based on Evolution Algorithm
    Wang, Maocai
    Dai, Guangming
    Hu, Hanping
    Pen, Lei
    PROCEEDINGS OF THE 2009 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND NATURAL COMPUTING, VOL I, 2009, : 55 - +
  • [29] On Securing the Communication in IoT Infrastructure using Elliptic Curve Cryptography
    Bourreau, Hugo
    Guichet, Emeric
    Barrak, Amine
    Simon, Benoit
    Jaafar, Fehmi
    2022 IEEE 22ND INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY, AND SECURITY COMPANION, QRS-C, 2022, : 758 - 759
  • [30] Catalan's Conjecture and Elliptic Curve Cryptography (CCECC) Algorithm for Enhancing Data Security During Data Transmission in MANET
    Pauline, D. Eben Angel
    COMPUTING SCIENCE, COMMUNICATION AND SECURITY, COMS2 2024, 2025, 2174 : 245 - 254